1 // SPDX-License-Identifier: GPL-2.0
3 * Copyright (C) 2007 Oracle. All rights reserved.
6 #include <linux/kernel.h>
8 #include <linux/file.h>
10 #include <linux/fsnotify.h>
11 #include <linux/pagemap.h>
12 #include <linux/highmem.h>
13 #include <linux/time.h>
14 #include <linux/string.h>
15 #include <linux/backing-dev.h>
16 #include <linux/mount.h>
17 #include <linux/namei.h>
18 #include <linux/writeback.h>
19 #include <linux/compat.h>
20 #include <linux/security.h>
21 #include <linux/xattr.h>
23 #include <linux/slab.h>
24 #include <linux/blkdev.h>
25 #include <linux/uuid.h>
26 #include <linux/btrfs.h>
27 #include <linux/uaccess.h>
28 #include <linux/iversion.h>
29 #include <linux/fileattr.h>
30 #include <linux/fsverity.h>
31 #include <linux/sched/xacct.h>
32 #include <linux/io_uring/cmd.h>
36 #include "transaction.h"
37 #include "btrfs_inode.h"
42 #include "dev-replace.h"
47 #include "compression.h"
48 #include "space-info.h"
49 #include "block-group.h"
51 #include "accessors.h"
52 #include "extent-tree.h"
53 #include "root-tree.h"
56 #include "uuid-tree.h"
63 /* If we have a 32-bit userspace and 64-bit kernel, then the UAPI
64 * structures are incorrect, as the timespec structure from userspace
65 * is 4 bytes too small. We define these alternatives here to teach
66 * the kernel about the 32-bit struct packing.
68 struct btrfs_ioctl_timespec_32
{
71 } __attribute__ ((__packed__
));
73 struct btrfs_ioctl_received_subvol_args_32
{
74 char uuid
[BTRFS_UUID_SIZE
]; /* in */
75 __u64 stransid
; /* in */
76 __u64 rtransid
; /* out */
77 struct btrfs_ioctl_timespec_32 stime
; /* in */
78 struct btrfs_ioctl_timespec_32 rtime
; /* out */
80 __u64 reserved
[16]; /* in */
81 } __attribute__ ((__packed__
));
83 #define BTRFS_IOC_SET_RECEIVED_SUBVOL_32 _IOWR(BTRFS_IOCTL_MAGIC, 37, \
84 struct btrfs_ioctl_received_subvol_args_32)
87 #if defined(CONFIG_64BIT) && defined(CONFIG_COMPAT)
88 struct btrfs_ioctl_send_args_32
{
89 __s64 send_fd
; /* in */
90 __u64 clone_sources_count
; /* in */
91 compat_uptr_t clone_sources
; /* in */
92 __u64 parent_root
; /* in */
94 __u32 version
; /* in */
95 __u8 reserved
[28]; /* in */
96 } __attribute__ ((__packed__
));
98 #define BTRFS_IOC_SEND_32 _IOW(BTRFS_IOCTL_MAGIC, 38, \
99 struct btrfs_ioctl_send_args_32)
101 struct btrfs_ioctl_encoded_io_args_32
{
103 compat_ulong_t iovcnt
;
108 __u64 unencoded_offset
;
114 #define BTRFS_IOC_ENCODED_READ_32 _IOR(BTRFS_IOCTL_MAGIC, 64, \
115 struct btrfs_ioctl_encoded_io_args_32)
116 #define BTRFS_IOC_ENCODED_WRITE_32 _IOW(BTRFS_IOCTL_MAGIC, 64, \
117 struct btrfs_ioctl_encoded_io_args_32)
120 /* Mask out flags that are inappropriate for the given type of inode. */
121 static unsigned int btrfs_mask_fsflags_for_type(struct inode
*inode
,
124 if (S_ISDIR(inode
->i_mode
))
126 else if (S_ISREG(inode
->i_mode
))
127 return flags
& ~FS_DIRSYNC_FL
;
129 return flags
& (FS_NODUMP_FL
| FS_NOATIME_FL
);
133 * Export internal inode flags to the format expected by the FS_IOC_GETFLAGS
136 static unsigned int btrfs_inode_flags_to_fsflags(struct btrfs_inode
*binode
)
138 unsigned int iflags
= 0;
139 u32 flags
= binode
->flags
;
140 u32 ro_flags
= binode
->ro_flags
;
142 if (flags
& BTRFS_INODE_SYNC
)
143 iflags
|= FS_SYNC_FL
;
144 if (flags
& BTRFS_INODE_IMMUTABLE
)
145 iflags
|= FS_IMMUTABLE_FL
;
146 if (flags
& BTRFS_INODE_APPEND
)
147 iflags
|= FS_APPEND_FL
;
148 if (flags
& BTRFS_INODE_NODUMP
)
149 iflags
|= FS_NODUMP_FL
;
150 if (flags
& BTRFS_INODE_NOATIME
)
151 iflags
|= FS_NOATIME_FL
;
152 if (flags
& BTRFS_INODE_DIRSYNC
)
153 iflags
|= FS_DIRSYNC_FL
;
154 if (flags
& BTRFS_INODE_NODATACOW
)
155 iflags
|= FS_NOCOW_FL
;
156 if (ro_flags
& BTRFS_INODE_RO_VERITY
)
157 iflags
|= FS_VERITY_FL
;
159 if (flags
& BTRFS_INODE_NOCOMPRESS
)
160 iflags
|= FS_NOCOMP_FL
;
161 else if (flags
& BTRFS_INODE_COMPRESS
)
162 iflags
|= FS_COMPR_FL
;
168 * Update inode->i_flags based on the btrfs internal flags.
170 void btrfs_sync_inode_flags_to_i_flags(struct inode
*inode
)
172 struct btrfs_inode
*binode
= BTRFS_I(inode
);
173 unsigned int new_fl
= 0;
175 if (binode
->flags
& BTRFS_INODE_SYNC
)
177 if (binode
->flags
& BTRFS_INODE_IMMUTABLE
)
178 new_fl
|= S_IMMUTABLE
;
179 if (binode
->flags
& BTRFS_INODE_APPEND
)
181 if (binode
->flags
& BTRFS_INODE_NOATIME
)
183 if (binode
->flags
& BTRFS_INODE_DIRSYNC
)
185 if (binode
->ro_flags
& BTRFS_INODE_RO_VERITY
)
188 set_mask_bits(&inode
->i_flags
,
189 S_SYNC
| S_APPEND
| S_IMMUTABLE
| S_NOATIME
| S_DIRSYNC
|
194 * Check if @flags are a supported and valid set of FS_*_FL flags and that
195 * the old and new flags are not conflicting
197 static int check_fsflags(unsigned int old_flags
, unsigned int flags
)
199 if (flags
& ~(FS_IMMUTABLE_FL
| FS_APPEND_FL
| \
200 FS_NOATIME_FL
| FS_NODUMP_FL
| \
201 FS_SYNC_FL
| FS_DIRSYNC_FL
| \
202 FS_NOCOMP_FL
| FS_COMPR_FL
|
206 /* COMPR and NOCOMP on new/old are valid */
207 if ((flags
& FS_NOCOMP_FL
) && (flags
& FS_COMPR_FL
))
210 if ((flags
& FS_COMPR_FL
) && (flags
& FS_NOCOW_FL
))
213 /* NOCOW and compression options are mutually exclusive */
214 if ((old_flags
& FS_NOCOW_FL
) && (flags
& (FS_COMPR_FL
| FS_NOCOMP_FL
)))
216 if ((flags
& FS_NOCOW_FL
) && (old_flags
& (FS_COMPR_FL
| FS_NOCOMP_FL
)))
222 static int check_fsflags_compatible(struct btrfs_fs_info
*fs_info
,
225 if (btrfs_is_zoned(fs_info
) && (flags
& FS_NOCOW_FL
))
231 int btrfs_check_ioctl_vol_args_path(const struct btrfs_ioctl_vol_args
*vol_args
)
233 if (memchr(vol_args
->name
, 0, sizeof(vol_args
->name
)) == NULL
)
234 return -ENAMETOOLONG
;
238 static int btrfs_check_ioctl_vol_args2_subvol_name(const struct btrfs_ioctl_vol_args_v2
*vol_args2
)
240 if (memchr(vol_args2
->name
, 0, sizeof(vol_args2
->name
)) == NULL
)
241 return -ENAMETOOLONG
;
246 * Set flags/xflags from the internal inode flags. The remaining items of
247 * fsxattr are zeroed.
249 int btrfs_fileattr_get(struct dentry
*dentry
, struct fileattr
*fa
)
251 struct btrfs_inode
*binode
= BTRFS_I(d_inode(dentry
));
253 fileattr_fill_flags(fa
, btrfs_inode_flags_to_fsflags(binode
));
257 int btrfs_fileattr_set(struct mnt_idmap
*idmap
,
258 struct dentry
*dentry
, struct fileattr
*fa
)
260 struct inode
*inode
= d_inode(dentry
);
261 struct btrfs_fs_info
*fs_info
= inode_to_fs_info(inode
);
262 struct btrfs_inode
*binode
= BTRFS_I(inode
);
263 struct btrfs_root
*root
= binode
->root
;
264 struct btrfs_trans_handle
*trans
;
265 unsigned int fsflags
, old_fsflags
;
267 const char *comp
= NULL
;
270 if (btrfs_root_readonly(root
))
273 if (fileattr_has_fsx(fa
))
276 fsflags
= btrfs_mask_fsflags_for_type(inode
, fa
->flags
);
277 old_fsflags
= btrfs_inode_flags_to_fsflags(binode
);
278 ret
= check_fsflags(old_fsflags
, fsflags
);
282 ret
= check_fsflags_compatible(fs_info
, fsflags
);
286 binode_flags
= binode
->flags
;
287 if (fsflags
& FS_SYNC_FL
)
288 binode_flags
|= BTRFS_INODE_SYNC
;
290 binode_flags
&= ~BTRFS_INODE_SYNC
;
291 if (fsflags
& FS_IMMUTABLE_FL
)
292 binode_flags
|= BTRFS_INODE_IMMUTABLE
;
294 binode_flags
&= ~BTRFS_INODE_IMMUTABLE
;
295 if (fsflags
& FS_APPEND_FL
)
296 binode_flags
|= BTRFS_INODE_APPEND
;
298 binode_flags
&= ~BTRFS_INODE_APPEND
;
299 if (fsflags
& FS_NODUMP_FL
)
300 binode_flags
|= BTRFS_INODE_NODUMP
;
302 binode_flags
&= ~BTRFS_INODE_NODUMP
;
303 if (fsflags
& FS_NOATIME_FL
)
304 binode_flags
|= BTRFS_INODE_NOATIME
;
306 binode_flags
&= ~BTRFS_INODE_NOATIME
;
308 /* If coming from FS_IOC_FSSETXATTR then skip unconverted flags */
309 if (!fa
->flags_valid
) {
310 /* 1 item for the inode */
311 trans
= btrfs_start_transaction(root
, 1);
313 return PTR_ERR(trans
);
317 if (fsflags
& FS_DIRSYNC_FL
)
318 binode_flags
|= BTRFS_INODE_DIRSYNC
;
320 binode_flags
&= ~BTRFS_INODE_DIRSYNC
;
321 if (fsflags
& FS_NOCOW_FL
) {
322 if (S_ISREG(inode
->i_mode
)) {
324 * It's safe to turn csums off here, no extents exist.
325 * Otherwise we want the flag to reflect the real COW
326 * status of the file and will not set it.
328 if (inode
->i_size
== 0)
329 binode_flags
|= BTRFS_INODE_NODATACOW
|
330 BTRFS_INODE_NODATASUM
;
332 binode_flags
|= BTRFS_INODE_NODATACOW
;
336 * Revert back under same assumptions as above
338 if (S_ISREG(inode
->i_mode
)) {
339 if (inode
->i_size
== 0)
340 binode_flags
&= ~(BTRFS_INODE_NODATACOW
|
341 BTRFS_INODE_NODATASUM
);
343 binode_flags
&= ~BTRFS_INODE_NODATACOW
;
348 * The COMPRESS flag can only be changed by users, while the NOCOMPRESS
349 * flag may be changed automatically if compression code won't make
352 if (fsflags
& FS_NOCOMP_FL
) {
353 binode_flags
&= ~BTRFS_INODE_COMPRESS
;
354 binode_flags
|= BTRFS_INODE_NOCOMPRESS
;
355 } else if (fsflags
& FS_COMPR_FL
) {
357 if (IS_SWAPFILE(inode
))
360 binode_flags
|= BTRFS_INODE_COMPRESS
;
361 binode_flags
&= ~BTRFS_INODE_NOCOMPRESS
;
363 comp
= btrfs_compress_type2str(fs_info
->compress_type
);
364 if (!comp
|| comp
[0] == 0)
365 comp
= btrfs_compress_type2str(BTRFS_COMPRESS_ZLIB
);
367 binode_flags
&= ~(BTRFS_INODE_COMPRESS
| BTRFS_INODE_NOCOMPRESS
);
374 trans
= btrfs_start_transaction(root
, 3);
376 return PTR_ERR(trans
);
379 ret
= btrfs_set_prop(trans
, BTRFS_I(inode
), "btrfs.compression",
380 comp
, strlen(comp
), 0);
382 btrfs_abort_transaction(trans
, ret
);
386 ret
= btrfs_set_prop(trans
, BTRFS_I(inode
), "btrfs.compression",
388 if (ret
&& ret
!= -ENODATA
) {
389 btrfs_abort_transaction(trans
, ret
);
395 binode
->flags
= binode_flags
;
396 btrfs_sync_inode_flags_to_i_flags(inode
);
397 inode_inc_iversion(inode
);
398 inode_set_ctime_current(inode
);
399 ret
= btrfs_update_inode(trans
, BTRFS_I(inode
));
402 btrfs_end_transaction(trans
);
407 * Start exclusive operation @type, return true on success
409 bool btrfs_exclop_start(struct btrfs_fs_info
*fs_info
,
410 enum btrfs_exclusive_operation type
)
414 spin_lock(&fs_info
->super_lock
);
415 if (fs_info
->exclusive_operation
== BTRFS_EXCLOP_NONE
) {
416 fs_info
->exclusive_operation
= type
;
419 spin_unlock(&fs_info
->super_lock
);
425 * Conditionally allow to enter the exclusive operation in case it's compatible
426 * with the running one. This must be paired with btrfs_exclop_start_unlock and
427 * btrfs_exclop_finish.
430 * - the same type is already running
431 * - when trying to add a device and balance has been paused
432 * - not BTRFS_EXCLOP_NONE - this is intentionally incompatible and the caller
433 * must check the condition first that would allow none -> @type
435 bool btrfs_exclop_start_try_lock(struct btrfs_fs_info
*fs_info
,
436 enum btrfs_exclusive_operation type
)
438 spin_lock(&fs_info
->super_lock
);
439 if (fs_info
->exclusive_operation
== type
||
440 (fs_info
->exclusive_operation
== BTRFS_EXCLOP_BALANCE_PAUSED
&&
441 type
== BTRFS_EXCLOP_DEV_ADD
))
444 spin_unlock(&fs_info
->super_lock
);
448 void btrfs_exclop_start_unlock(struct btrfs_fs_info
*fs_info
)
450 spin_unlock(&fs_info
->super_lock
);
453 void btrfs_exclop_finish(struct btrfs_fs_info
*fs_info
)
455 spin_lock(&fs_info
->super_lock
);
456 WRITE_ONCE(fs_info
->exclusive_operation
, BTRFS_EXCLOP_NONE
);
457 spin_unlock(&fs_info
->super_lock
);
458 sysfs_notify(&fs_info
->fs_devices
->fsid_kobj
, NULL
, "exclusive_operation");
461 void btrfs_exclop_balance(struct btrfs_fs_info
*fs_info
,
462 enum btrfs_exclusive_operation op
)
465 case BTRFS_EXCLOP_BALANCE_PAUSED
:
466 spin_lock(&fs_info
->super_lock
);
467 ASSERT(fs_info
->exclusive_operation
== BTRFS_EXCLOP_BALANCE
||
468 fs_info
->exclusive_operation
== BTRFS_EXCLOP_DEV_ADD
||
469 fs_info
->exclusive_operation
== BTRFS_EXCLOP_NONE
||
470 fs_info
->exclusive_operation
== BTRFS_EXCLOP_BALANCE_PAUSED
);
471 fs_info
->exclusive_operation
= BTRFS_EXCLOP_BALANCE_PAUSED
;
472 spin_unlock(&fs_info
->super_lock
);
474 case BTRFS_EXCLOP_BALANCE
:
475 spin_lock(&fs_info
->super_lock
);
476 ASSERT(fs_info
->exclusive_operation
== BTRFS_EXCLOP_BALANCE_PAUSED
);
477 fs_info
->exclusive_operation
= BTRFS_EXCLOP_BALANCE
;
478 spin_unlock(&fs_info
->super_lock
);
482 "invalid exclop balance operation %d requested", op
);
486 static int btrfs_ioctl_getversion(struct inode
*inode
, int __user
*arg
)
488 return put_user(inode
->i_generation
, arg
);
491 static noinline
int btrfs_ioctl_fitrim(struct btrfs_fs_info
*fs_info
,
494 struct btrfs_device
*device
;
495 struct fstrim_range range
;
496 u64 minlen
= ULLONG_MAX
;
500 if (!capable(CAP_SYS_ADMIN
))
504 * btrfs_trim_block_group() depends on space cache, which is not
505 * available in zoned filesystem. So, disallow fitrim on a zoned
506 * filesystem for now.
508 if (btrfs_is_zoned(fs_info
))
512 * If the fs is mounted with nologreplay, which requires it to be
513 * mounted in RO mode as well, we can not allow discard on free space
514 * inside block groups, because log trees refer to extents that are not
515 * pinned in a block group's free space cache (pinning the extents is
516 * precisely the first phase of replaying a log tree).
518 if (btrfs_test_opt(fs_info
, NOLOGREPLAY
))
522 list_for_each_entry_rcu(device
, &fs_info
->fs_devices
->devices
,
524 if (!device
->bdev
|| !bdev_max_discard_sectors(device
->bdev
))
527 minlen
= min_t(u64
, bdev_discard_granularity(device
->bdev
),
534 if (copy_from_user(&range
, arg
, sizeof(range
)))
538 * NOTE: Don't truncate the range using super->total_bytes. Bytenr of
539 * block group is in the logical address space, which can be any
540 * sectorsize aligned bytenr in the range [0, U64_MAX].
542 if (range
.len
< fs_info
->sectorsize
)
545 range
.minlen
= max(range
.minlen
, minlen
);
546 ret
= btrfs_trim_fs(fs_info
, &range
);
548 if (copy_to_user(arg
, &range
, sizeof(range
)))
554 int __pure
btrfs_is_empty_uuid(const u8
*uuid
)
558 for (i
= 0; i
< BTRFS_UUID_SIZE
; i
++) {
566 * Calculate the number of transaction items to reserve for creating a subvolume
567 * or snapshot, not including the inode, directory entries, or parent directory.
569 static unsigned int create_subvol_num_items(struct btrfs_qgroup_inherit
*inherit
)
572 * 1 to add root block
575 * 1 to add root backref
577 * 1 to add qgroup info
578 * 1 to add qgroup limit
580 * Ideally the last two would only be accounted if qgroups are enabled,
581 * but that can change between now and the time we would insert them.
583 unsigned int num_items
= 7;
586 /* 2 to add qgroup relations for each inherited qgroup */
587 num_items
+= 2 * inherit
->num_qgroups
;
592 static noinline
int create_subvol(struct mnt_idmap
*idmap
,
593 struct inode
*dir
, struct dentry
*dentry
,
594 struct btrfs_qgroup_inherit
*inherit
)
596 struct btrfs_fs_info
*fs_info
= inode_to_fs_info(dir
);
597 struct btrfs_trans_handle
*trans
;
598 struct btrfs_key key
;
599 struct btrfs_root_item
*root_item
;
600 struct btrfs_inode_item
*inode_item
;
601 struct extent_buffer
*leaf
;
602 struct btrfs_root
*root
= BTRFS_I(dir
)->root
;
603 struct btrfs_root
*new_root
;
604 struct btrfs_block_rsv block_rsv
;
605 struct timespec64 cur_time
= current_time(dir
);
606 struct btrfs_new_inode_args new_inode_args
= {
611 unsigned int trans_num_items
;
615 u64 qgroup_reserved
= 0;
617 root_item
= kzalloc(sizeof(*root_item
), GFP_KERNEL
);
621 ret
= btrfs_get_free_objectid(fs_info
->tree_root
, &objectid
);
626 * Don't create subvolume whose level is not zero. Or qgroup will be
627 * screwed up since it assumes subvolume qgroup's level to be 0.
629 if (btrfs_qgroup_level(objectid
)) {
634 ret
= get_anon_bdev(&anon_dev
);
638 new_inode_args
.inode
= btrfs_new_subvol_inode(idmap
, dir
);
639 if (!new_inode_args
.inode
) {
643 ret
= btrfs_new_inode_prepare(&new_inode_args
, &trans_num_items
);
646 trans_num_items
+= create_subvol_num_items(inherit
);
648 btrfs_init_block_rsv(&block_rsv
, BTRFS_BLOCK_RSV_TEMP
);
649 ret
= btrfs_subvolume_reserve_metadata(root
, &block_rsv
,
650 trans_num_items
, false);
652 goto out_new_inode_args
;
653 qgroup_reserved
= block_rsv
.qgroup_rsv_reserved
;
655 trans
= btrfs_start_transaction(root
, 0);
657 ret
= PTR_ERR(trans
);
658 goto out_release_rsv
;
660 btrfs_qgroup_convert_reserved_meta(root
, qgroup_reserved
);
662 trans
->block_rsv
= &block_rsv
;
663 trans
->bytes_reserved
= block_rsv
.size
;
665 ret
= btrfs_qgroup_inherit(trans
, 0, objectid
, btrfs_root_id(root
), inherit
);
669 leaf
= btrfs_alloc_tree_block(trans
, root
, 0, objectid
, NULL
, 0, 0, 0,
670 0, BTRFS_NESTING_NORMAL
);
676 btrfs_mark_buffer_dirty(trans
, leaf
);
678 inode_item
= &root_item
->inode
;
679 btrfs_set_stack_inode_generation(inode_item
, 1);
680 btrfs_set_stack_inode_size(inode_item
, 3);
681 btrfs_set_stack_inode_nlink(inode_item
, 1);
682 btrfs_set_stack_inode_nbytes(inode_item
,
684 btrfs_set_stack_inode_mode(inode_item
, S_IFDIR
| 0755);
686 btrfs_set_root_flags(root_item
, 0);
687 btrfs_set_root_limit(root_item
, 0);
688 btrfs_set_stack_inode_flags(inode_item
, BTRFS_INODE_ROOT_ITEM_INIT
);
690 btrfs_set_root_bytenr(root_item
, leaf
->start
);
691 btrfs_set_root_generation(root_item
, trans
->transid
);
692 btrfs_set_root_level(root_item
, 0);
693 btrfs_set_root_refs(root_item
, 1);
694 btrfs_set_root_used(root_item
, leaf
->len
);
695 btrfs_set_root_last_snapshot(root_item
, 0);
697 btrfs_set_root_generation_v2(root_item
,
698 btrfs_root_generation(root_item
));
699 generate_random_guid(root_item
->uuid
);
700 btrfs_set_stack_timespec_sec(&root_item
->otime
, cur_time
.tv_sec
);
701 btrfs_set_stack_timespec_nsec(&root_item
->otime
, cur_time
.tv_nsec
);
702 root_item
->ctime
= root_item
->otime
;
703 btrfs_set_root_ctransid(root_item
, trans
->transid
);
704 btrfs_set_root_otransid(root_item
, trans
->transid
);
706 btrfs_tree_unlock(leaf
);
708 btrfs_set_root_dirid(root_item
, BTRFS_FIRST_FREE_OBJECTID
);
710 key
.objectid
= objectid
;
712 key
.type
= BTRFS_ROOT_ITEM_KEY
;
713 ret
= btrfs_insert_root(trans
, fs_info
->tree_root
, &key
,
719 * Since we don't abort the transaction in this case, free the
720 * tree block so that we don't leak space and leave the
721 * filesystem in an inconsistent state (an extent item in the
722 * extent tree with a backreference for a root that does not
725 btrfs_tree_lock(leaf
);
726 btrfs_clear_buffer_dirty(trans
, leaf
);
727 btrfs_tree_unlock(leaf
);
728 ret2
= btrfs_free_tree_block(trans
, objectid
, leaf
, 0, 1);
730 btrfs_abort_transaction(trans
, ret2
);
731 free_extent_buffer(leaf
);
735 free_extent_buffer(leaf
);
738 new_root
= btrfs_get_new_fs_root(fs_info
, objectid
, &anon_dev
);
739 if (IS_ERR(new_root
)) {
740 ret
= PTR_ERR(new_root
);
741 btrfs_abort_transaction(trans
, ret
);
744 /* anon_dev is owned by new_root now. */
746 BTRFS_I(new_inode_args
.inode
)->root
= new_root
;
747 /* ... and new_root is owned by new_inode_args.inode now. */
749 ret
= btrfs_record_root_in_trans(trans
, new_root
);
751 btrfs_abort_transaction(trans
, ret
);
755 ret
= btrfs_uuid_tree_add(trans
, root_item
->uuid
,
756 BTRFS_UUID_KEY_SUBVOL
, objectid
);
758 btrfs_abort_transaction(trans
, ret
);
762 ret
= btrfs_create_new_inode(trans
, &new_inode_args
);
764 btrfs_abort_transaction(trans
, ret
);
768 btrfs_record_new_subvolume(trans
, BTRFS_I(dir
));
770 d_instantiate_new(dentry
, new_inode_args
.inode
);
771 new_inode_args
.inode
= NULL
;
774 trans
->block_rsv
= NULL
;
775 trans
->bytes_reserved
= 0;
776 btrfs_end_transaction(trans
);
778 btrfs_block_rsv_release(fs_info
, &block_rsv
, (u64
)-1, NULL
);
780 btrfs_qgroup_free_meta_prealloc(root
, qgroup_reserved
);
782 btrfs_new_inode_args_destroy(&new_inode_args
);
784 iput(new_inode_args
.inode
);
787 free_anon_bdev(anon_dev
);
793 static int create_snapshot(struct btrfs_root
*root
, struct inode
*dir
,
794 struct dentry
*dentry
, bool readonly
,
795 struct btrfs_qgroup_inherit
*inherit
)
797 struct btrfs_fs_info
*fs_info
= inode_to_fs_info(dir
);
799 struct btrfs_pending_snapshot
*pending_snapshot
;
800 unsigned int trans_num_items
;
801 struct btrfs_trans_handle
*trans
;
802 struct btrfs_block_rsv
*block_rsv
;
803 u64 qgroup_reserved
= 0;
806 /* We do not support snapshotting right now. */
807 if (btrfs_fs_incompat(fs_info
, EXTENT_TREE_V2
)) {
809 "extent tree v2 doesn't support snapshotting yet");
813 if (btrfs_root_refs(&root
->root_item
) == 0)
816 if (!test_bit(BTRFS_ROOT_SHAREABLE
, &root
->state
))
819 if (atomic_read(&root
->nr_swapfiles
)) {
821 "cannot snapshot subvolume with active swapfile");
825 pending_snapshot
= kzalloc(sizeof(*pending_snapshot
), GFP_KERNEL
);
826 if (!pending_snapshot
)
829 ret
= get_anon_bdev(&pending_snapshot
->anon_dev
);
832 pending_snapshot
->root_item
= kzalloc(sizeof(struct btrfs_root_item
),
834 pending_snapshot
->path
= btrfs_alloc_path();
835 if (!pending_snapshot
->root_item
|| !pending_snapshot
->path
) {
840 block_rsv
= &pending_snapshot
->block_rsv
;
841 btrfs_init_block_rsv(block_rsv
, BTRFS_BLOCK_RSV_TEMP
);
845 * 1 to update parent inode item
847 trans_num_items
= create_subvol_num_items(inherit
) + 3;
848 ret
= btrfs_subvolume_reserve_metadata(BTRFS_I(dir
)->root
, block_rsv
,
849 trans_num_items
, false);
852 qgroup_reserved
= block_rsv
->qgroup_rsv_reserved
;
854 pending_snapshot
->dentry
= dentry
;
855 pending_snapshot
->root
= root
;
856 pending_snapshot
->readonly
= readonly
;
857 pending_snapshot
->dir
= BTRFS_I(dir
);
858 pending_snapshot
->inherit
= inherit
;
860 trans
= btrfs_start_transaction(root
, 0);
862 ret
= PTR_ERR(trans
);
865 ret
= btrfs_record_root_in_trans(trans
, BTRFS_I(dir
)->root
);
867 btrfs_end_transaction(trans
);
870 btrfs_qgroup_convert_reserved_meta(root
, qgroup_reserved
);
873 trans
->pending_snapshot
= pending_snapshot
;
875 ret
= btrfs_commit_transaction(trans
);
879 ret
= pending_snapshot
->error
;
883 ret
= btrfs_orphan_cleanup(pending_snapshot
->snap
);
887 inode
= btrfs_lookup_dentry(d_inode(dentry
->d_parent
), dentry
);
889 ret
= PTR_ERR(inode
);
893 d_instantiate(dentry
, inode
);
895 pending_snapshot
->anon_dev
= 0;
897 /* Prevent double freeing of anon_dev */
898 if (ret
&& pending_snapshot
->snap
)
899 pending_snapshot
->snap
->anon_dev
= 0;
900 btrfs_put_root(pending_snapshot
->snap
);
901 btrfs_block_rsv_release(fs_info
, block_rsv
, (u64
)-1, NULL
);
903 btrfs_qgroup_free_meta_prealloc(root
, qgroup_reserved
);
905 if (pending_snapshot
->anon_dev
)
906 free_anon_bdev(pending_snapshot
->anon_dev
);
907 kfree(pending_snapshot
->root_item
);
908 btrfs_free_path(pending_snapshot
->path
);
909 kfree(pending_snapshot
);
914 /* copy of may_delete in fs/namei.c()
915 * Check whether we can remove a link victim from directory dir, check
916 * whether the type of victim is right.
917 * 1. We can't do it if dir is read-only (done in permission())
918 * 2. We should have write and exec permissions on dir
919 * 3. We can't remove anything from append-only dir
920 * 4. We can't do anything with immutable dir (done in permission())
921 * 5. If the sticky bit on dir is set we should either
922 * a. be owner of dir, or
923 * b. be owner of victim, or
924 * c. have CAP_FOWNER capability
925 * 6. If the victim is append-only or immutable we can't do anything with
926 * links pointing to it.
927 * 7. If we were asked to remove a directory and victim isn't one - ENOTDIR.
928 * 8. If we were asked to remove a non-directory and victim isn't one - EISDIR.
929 * 9. We can't remove a root or mountpoint.
930 * 10. We don't allow removal of NFS sillyrenamed files; it's handled by
931 * nfs_async_unlink().
934 static int btrfs_may_delete(struct mnt_idmap
*idmap
,
935 struct inode
*dir
, struct dentry
*victim
, int isdir
)
939 if (d_really_is_negative(victim
))
942 /* The @victim is not inside @dir. */
943 if (d_inode(victim
->d_parent
) != dir
)
945 audit_inode_child(dir
, victim
, AUDIT_TYPE_CHILD_DELETE
);
947 error
= inode_permission(idmap
, dir
, MAY_WRITE
| MAY_EXEC
);
952 if (check_sticky(idmap
, dir
, d_inode(victim
)) ||
953 IS_APPEND(d_inode(victim
)) || IS_IMMUTABLE(d_inode(victim
)) ||
954 IS_SWAPFILE(d_inode(victim
)))
957 if (!d_is_dir(victim
))
961 } else if (d_is_dir(victim
))
965 if (victim
->d_flags
& DCACHE_NFSFS_RENAMED
)
970 /* copy of may_create in fs/namei.c() */
971 static inline int btrfs_may_create(struct mnt_idmap
*idmap
,
972 struct inode
*dir
, struct dentry
*child
)
974 if (d_really_is_positive(child
))
978 if (!fsuidgid_has_mapping(dir
->i_sb
, idmap
))
980 return inode_permission(idmap
, dir
, MAY_WRITE
| MAY_EXEC
);
984 * Create a new subvolume below @parent. This is largely modeled after
985 * sys_mkdirat and vfs_mkdir, but we only do a single component lookup
986 * inside this filesystem so it's quite a bit simpler.
988 static noinline
int btrfs_mksubvol(const struct path
*parent
,
989 struct mnt_idmap
*idmap
,
990 const char *name
, int namelen
,
991 struct btrfs_root
*snap_src
,
993 struct btrfs_qgroup_inherit
*inherit
)
995 struct inode
*dir
= d_inode(parent
->dentry
);
996 struct btrfs_fs_info
*fs_info
= inode_to_fs_info(dir
);
997 struct dentry
*dentry
;
998 struct fscrypt_str name_str
= FSTR_INIT((char *)name
, namelen
);
1001 error
= down_write_killable_nested(&dir
->i_rwsem
, I_MUTEX_PARENT
);
1002 if (error
== -EINTR
)
1005 dentry
= lookup_one(idmap
, name
, parent
->dentry
, namelen
);
1006 error
= PTR_ERR(dentry
);
1010 error
= btrfs_may_create(idmap
, dir
, dentry
);
1015 * even if this name doesn't exist, we may get hash collisions.
1016 * check for them now when we can safely fail
1018 error
= btrfs_check_dir_item_collision(BTRFS_I(dir
)->root
,
1019 dir
->i_ino
, &name_str
);
1023 down_read(&fs_info
->subvol_sem
);
1025 if (btrfs_root_refs(&BTRFS_I(dir
)->root
->root_item
) == 0)
1029 error
= create_snapshot(snap_src
, dir
, dentry
, readonly
, inherit
);
1031 error
= create_subvol(idmap
, dir
, dentry
, inherit
);
1034 fsnotify_mkdir(dir
, dentry
);
1036 up_read(&fs_info
->subvol_sem
);
1040 btrfs_inode_unlock(BTRFS_I(dir
), 0);
1044 static noinline
int btrfs_mksnapshot(const struct path
*parent
,
1045 struct mnt_idmap
*idmap
,
1046 const char *name
, int namelen
,
1047 struct btrfs_root
*root
,
1049 struct btrfs_qgroup_inherit
*inherit
)
1054 * Force new buffered writes to reserve space even when NOCOW is
1055 * possible. This is to avoid later writeback (running dealloc) to
1056 * fallback to COW mode and unexpectedly fail with ENOSPC.
1058 btrfs_drew_read_lock(&root
->snapshot_lock
);
1060 ret
= btrfs_start_delalloc_snapshot(root
, false);
1065 * All previous writes have started writeback in NOCOW mode, so now
1066 * we force future writes to fallback to COW mode during snapshot
1069 atomic_inc(&root
->snapshot_force_cow
);
1071 btrfs_wait_ordered_extents(root
, U64_MAX
, NULL
);
1073 ret
= btrfs_mksubvol(parent
, idmap
, name
, namelen
,
1074 root
, readonly
, inherit
);
1075 atomic_dec(&root
->snapshot_force_cow
);
1077 btrfs_drew_read_unlock(&root
->snapshot_lock
);
1082 * Try to start exclusive operation @type or cancel it if it's running.
1085 * 0 - normal mode, newly claimed op started
1086 * >0 - normal mode, something else is running,
1087 * return BTRFS_ERROR_DEV_EXCL_RUN_IN_PROGRESS to user space
1088 * ECANCELED - cancel mode, successful cancel
1089 * ENOTCONN - cancel mode, operation not running anymore
1091 static int exclop_start_or_cancel_reloc(struct btrfs_fs_info
*fs_info
,
1092 enum btrfs_exclusive_operation type
, bool cancel
)
1095 /* Start normal op */
1096 if (!btrfs_exclop_start(fs_info
, type
))
1097 return BTRFS_ERROR_DEV_EXCL_RUN_IN_PROGRESS
;
1098 /* Exclusive operation is now claimed */
1102 /* Cancel running op */
1103 if (btrfs_exclop_start_try_lock(fs_info
, type
)) {
1105 * This blocks any exclop finish from setting it to NONE, so we
1106 * request cancellation. Either it runs and we will wait for it,
1107 * or it has finished and no waiting will happen.
1109 atomic_inc(&fs_info
->reloc_cancel_req
);
1110 btrfs_exclop_start_unlock(fs_info
);
1112 if (test_bit(BTRFS_FS_RELOC_RUNNING
, &fs_info
->flags
))
1113 wait_on_bit(&fs_info
->flags
, BTRFS_FS_RELOC_RUNNING
,
1114 TASK_INTERRUPTIBLE
);
1119 /* Something else is running or none */
1123 static noinline
int btrfs_ioctl_resize(struct file
*file
,
1126 BTRFS_DEV_LOOKUP_ARGS(args
);
1127 struct inode
*inode
= file_inode(file
);
1128 struct btrfs_fs_info
*fs_info
= inode_to_fs_info(inode
);
1132 struct btrfs_root
*root
= BTRFS_I(inode
)->root
;
1133 struct btrfs_ioctl_vol_args
*vol_args
;
1134 struct btrfs_trans_handle
*trans
;
1135 struct btrfs_device
*device
= NULL
;
1138 char *devstr
= NULL
;
1143 if (!capable(CAP_SYS_ADMIN
))
1146 ret
= mnt_want_write_file(file
);
1151 * Read the arguments before checking exclusivity to be able to
1152 * distinguish regular resize and cancel
1154 vol_args
= memdup_user(arg
, sizeof(*vol_args
));
1155 if (IS_ERR(vol_args
)) {
1156 ret
= PTR_ERR(vol_args
);
1159 ret
= btrfs_check_ioctl_vol_args_path(vol_args
);
1163 sizestr
= vol_args
->name
;
1164 cancel
= (strcmp("cancel", sizestr
) == 0);
1165 ret
= exclop_start_or_cancel_reloc(fs_info
, BTRFS_EXCLOP_RESIZE
, cancel
);
1168 /* Exclusive operation is now claimed */
1170 devstr
= strchr(sizestr
, ':');
1172 sizestr
= devstr
+ 1;
1174 devstr
= vol_args
->name
;
1175 ret
= kstrtoull(devstr
, 10, &devid
);
1182 btrfs_info(fs_info
, "resizing devid %llu", devid
);
1186 device
= btrfs_find_device(fs_info
->fs_devices
, &args
);
1188 btrfs_info(fs_info
, "resizer unable to find device %llu",
1194 if (!test_bit(BTRFS_DEV_STATE_WRITEABLE
, &device
->dev_state
)) {
1196 "resizer unable to apply on readonly device %llu",
1202 if (!strcmp(sizestr
, "max"))
1203 new_size
= bdev_nr_bytes(device
->bdev
);
1205 if (sizestr
[0] == '-') {
1208 } else if (sizestr
[0] == '+') {
1212 new_size
= memparse(sizestr
, &retptr
);
1213 if (*retptr
!= '\0' || new_size
== 0) {
1219 if (test_bit(BTRFS_DEV_STATE_REPLACE_TGT
, &device
->dev_state
)) {
1224 old_size
= btrfs_device_get_total_bytes(device
);
1227 if (new_size
> old_size
) {
1231 new_size
= old_size
- new_size
;
1232 } else if (mod
> 0) {
1233 if (new_size
> ULLONG_MAX
- old_size
) {
1237 new_size
= old_size
+ new_size
;
1240 if (new_size
< SZ_256M
) {
1244 if (new_size
> bdev_nr_bytes(device
->bdev
)) {
1249 new_size
= round_down(new_size
, fs_info
->sectorsize
);
1251 if (new_size
> old_size
) {
1252 trans
= btrfs_start_transaction(root
, 0);
1253 if (IS_ERR(trans
)) {
1254 ret
= PTR_ERR(trans
);
1257 ret
= btrfs_grow_device(trans
, device
, new_size
);
1258 btrfs_commit_transaction(trans
);
1259 } else if (new_size
< old_size
) {
1260 ret
= btrfs_shrink_device(device
, new_size
);
1261 } /* equal, nothing need to do */
1263 if (ret
== 0 && new_size
!= old_size
)
1264 btrfs_info_in_rcu(fs_info
,
1265 "resize device %s (devid %llu) from %llu to %llu",
1266 btrfs_dev_name(device
), device
->devid
,
1267 old_size
, new_size
);
1269 btrfs_exclop_finish(fs_info
);
1273 mnt_drop_write_file(file
);
1277 static noinline
int __btrfs_ioctl_snap_create(struct file
*file
,
1278 struct mnt_idmap
*idmap
,
1279 const char *name
, unsigned long fd
, int subvol
,
1281 struct btrfs_qgroup_inherit
*inherit
)
1286 if (!S_ISDIR(file_inode(file
)->i_mode
))
1289 ret
= mnt_want_write_file(file
);
1293 namelen
= strlen(name
);
1294 if (strchr(name
, '/')) {
1296 goto out_drop_write
;
1299 if (name
[0] == '.' &&
1300 (namelen
== 1 || (name
[1] == '.' && namelen
== 2))) {
1302 goto out_drop_write
;
1306 ret
= btrfs_mksubvol(&file
->f_path
, idmap
, name
,
1307 namelen
, NULL
, readonly
, inherit
);
1310 struct inode
*src_inode
;
1311 if (fd_empty(src
)) {
1313 goto out_drop_write
;
1316 src_inode
= file_inode(fd_file(src
));
1317 if (src_inode
->i_sb
!= file_inode(file
)->i_sb
) {
1318 btrfs_info(BTRFS_I(file_inode(file
))->root
->fs_info
,
1319 "Snapshot src from another FS");
1321 } else if (!inode_owner_or_capable(idmap
, src_inode
)) {
1323 * Subvolume creation is not restricted, but snapshots
1324 * are limited to own subvolumes only
1327 } else if (btrfs_ino(BTRFS_I(src_inode
)) != BTRFS_FIRST_FREE_OBJECTID
) {
1329 * Snapshots must be made with the src_inode referring
1330 * to the subvolume inode, otherwise the permission
1331 * checking above is useless because we may have
1332 * permission on a lower directory but not the subvol
1337 ret
= btrfs_mksnapshot(&file
->f_path
, idmap
,
1339 BTRFS_I(src_inode
)->root
,
1344 mnt_drop_write_file(file
);
1349 static noinline
int btrfs_ioctl_snap_create(struct file
*file
,
1350 void __user
*arg
, int subvol
)
1352 struct btrfs_ioctl_vol_args
*vol_args
;
1355 if (!S_ISDIR(file_inode(file
)->i_mode
))
1358 vol_args
= memdup_user(arg
, sizeof(*vol_args
));
1359 if (IS_ERR(vol_args
))
1360 return PTR_ERR(vol_args
);
1361 ret
= btrfs_check_ioctl_vol_args_path(vol_args
);
1365 ret
= __btrfs_ioctl_snap_create(file
, file_mnt_idmap(file
),
1366 vol_args
->name
, vol_args
->fd
, subvol
,
1374 static noinline
int btrfs_ioctl_snap_create_v2(struct file
*file
,
1375 void __user
*arg
, int subvol
)
1377 struct btrfs_ioctl_vol_args_v2
*vol_args
;
1379 bool readonly
= false;
1380 struct btrfs_qgroup_inherit
*inherit
= NULL
;
1382 if (!S_ISDIR(file_inode(file
)->i_mode
))
1385 vol_args
= memdup_user(arg
, sizeof(*vol_args
));
1386 if (IS_ERR(vol_args
))
1387 return PTR_ERR(vol_args
);
1388 ret
= btrfs_check_ioctl_vol_args2_subvol_name(vol_args
);
1392 if (vol_args
->flags
& ~BTRFS_SUBVOL_CREATE_ARGS_MASK
) {
1397 if (vol_args
->flags
& BTRFS_SUBVOL_RDONLY
)
1399 if (vol_args
->flags
& BTRFS_SUBVOL_QGROUP_INHERIT
) {
1400 struct btrfs_fs_info
*fs_info
= inode_to_fs_info(file_inode(file
));
1402 if (vol_args
->size
< sizeof(*inherit
) ||
1403 vol_args
->size
> PAGE_SIZE
) {
1407 inherit
= memdup_user(vol_args
->qgroup_inherit
, vol_args
->size
);
1408 if (IS_ERR(inherit
)) {
1409 ret
= PTR_ERR(inherit
);
1413 ret
= btrfs_qgroup_check_inherit(fs_info
, inherit
, vol_args
->size
);
1418 ret
= __btrfs_ioctl_snap_create(file
, file_mnt_idmap(file
),
1419 vol_args
->name
, vol_args
->fd
, subvol
,
1430 static noinline
int btrfs_ioctl_subvol_getflags(struct inode
*inode
,
1433 struct btrfs_fs_info
*fs_info
= inode_to_fs_info(inode
);
1434 struct btrfs_root
*root
= BTRFS_I(inode
)->root
;
1438 if (btrfs_ino(BTRFS_I(inode
)) != BTRFS_FIRST_FREE_OBJECTID
)
1441 down_read(&fs_info
->subvol_sem
);
1442 if (btrfs_root_readonly(root
))
1443 flags
|= BTRFS_SUBVOL_RDONLY
;
1444 up_read(&fs_info
->subvol_sem
);
1446 if (copy_to_user(arg
, &flags
, sizeof(flags
)))
1452 static noinline
int btrfs_ioctl_subvol_setflags(struct file
*file
,
1455 struct inode
*inode
= file_inode(file
);
1456 struct btrfs_fs_info
*fs_info
= inode_to_fs_info(inode
);
1457 struct btrfs_root
*root
= BTRFS_I(inode
)->root
;
1458 struct btrfs_trans_handle
*trans
;
1463 if (!inode_owner_or_capable(file_mnt_idmap(file
), inode
))
1466 ret
= mnt_want_write_file(file
);
1470 if (btrfs_ino(BTRFS_I(inode
)) != BTRFS_FIRST_FREE_OBJECTID
) {
1472 goto out_drop_write
;
1475 if (copy_from_user(&flags
, arg
, sizeof(flags
))) {
1477 goto out_drop_write
;
1480 if (flags
& ~BTRFS_SUBVOL_RDONLY
) {
1482 goto out_drop_write
;
1485 down_write(&fs_info
->subvol_sem
);
1488 if (!!(flags
& BTRFS_SUBVOL_RDONLY
) == btrfs_root_readonly(root
))
1491 root_flags
= btrfs_root_flags(&root
->root_item
);
1492 if (flags
& BTRFS_SUBVOL_RDONLY
) {
1493 btrfs_set_root_flags(&root
->root_item
,
1494 root_flags
| BTRFS_ROOT_SUBVOL_RDONLY
);
1497 * Block RO -> RW transition if this subvolume is involved in
1500 spin_lock(&root
->root_item_lock
);
1501 if (root
->send_in_progress
== 0) {
1502 btrfs_set_root_flags(&root
->root_item
,
1503 root_flags
& ~BTRFS_ROOT_SUBVOL_RDONLY
);
1504 spin_unlock(&root
->root_item_lock
);
1506 spin_unlock(&root
->root_item_lock
);
1508 "Attempt to set subvolume %llu read-write during send",
1509 btrfs_root_id(root
));
1515 trans
= btrfs_start_transaction(root
, 1);
1516 if (IS_ERR(trans
)) {
1517 ret
= PTR_ERR(trans
);
1521 ret
= btrfs_update_root(trans
, fs_info
->tree_root
,
1522 &root
->root_key
, &root
->root_item
);
1524 btrfs_end_transaction(trans
);
1528 ret
= btrfs_commit_transaction(trans
);
1532 btrfs_set_root_flags(&root
->root_item
, root_flags
);
1534 up_write(&fs_info
->subvol_sem
);
1536 mnt_drop_write_file(file
);
1541 static noinline
int key_in_sk(struct btrfs_key
*key
,
1542 struct btrfs_ioctl_search_key
*sk
)
1544 struct btrfs_key test
;
1547 test
.objectid
= sk
->min_objectid
;
1548 test
.type
= sk
->min_type
;
1549 test
.offset
= sk
->min_offset
;
1551 ret
= btrfs_comp_cpu_keys(key
, &test
);
1555 test
.objectid
= sk
->max_objectid
;
1556 test
.type
= sk
->max_type
;
1557 test
.offset
= sk
->max_offset
;
1559 ret
= btrfs_comp_cpu_keys(key
, &test
);
1565 static noinline
int copy_to_sk(struct btrfs_path
*path
,
1566 struct btrfs_key
*key
,
1567 struct btrfs_ioctl_search_key
*sk
,
1570 unsigned long *sk_offset
,
1574 struct extent_buffer
*leaf
;
1575 struct btrfs_ioctl_search_header sh
;
1576 struct btrfs_key test
;
1577 unsigned long item_off
;
1578 unsigned long item_len
;
1584 leaf
= path
->nodes
[0];
1585 slot
= path
->slots
[0];
1586 nritems
= btrfs_header_nritems(leaf
);
1588 if (btrfs_header_generation(leaf
) > sk
->max_transid
) {
1592 found_transid
= btrfs_header_generation(leaf
);
1594 for (i
= slot
; i
< nritems
; i
++) {
1595 item_off
= btrfs_item_ptr_offset(leaf
, i
);
1596 item_len
= btrfs_item_size(leaf
, i
);
1598 btrfs_item_key_to_cpu(leaf
, key
, i
);
1599 if (!key_in_sk(key
, sk
))
1602 if (sizeof(sh
) + item_len
> *buf_size
) {
1609 * return one empty item back for v1, which does not
1613 *buf_size
= sizeof(sh
) + item_len
;
1618 if (sizeof(sh
) + item_len
+ *sk_offset
> *buf_size
) {
1623 sh
.objectid
= key
->objectid
;
1624 sh
.offset
= key
->offset
;
1625 sh
.type
= key
->type
;
1627 sh
.transid
= found_transid
;
1630 * Copy search result header. If we fault then loop again so we
1631 * can fault in the pages and -EFAULT there if there's a
1632 * problem. Otherwise we'll fault and then copy the buffer in
1633 * properly this next time through
1635 if (copy_to_user_nofault(ubuf
+ *sk_offset
, &sh
, sizeof(sh
))) {
1640 *sk_offset
+= sizeof(sh
);
1643 char __user
*up
= ubuf
+ *sk_offset
;
1645 * Copy the item, same behavior as above, but reset the
1646 * * sk_offset so we copy the full thing again.
1648 if (read_extent_buffer_to_user_nofault(leaf
, up
,
1649 item_off
, item_len
)) {
1651 *sk_offset
-= sizeof(sh
);
1655 *sk_offset
+= item_len
;
1659 if (ret
) /* -EOVERFLOW from above */
1662 if (*num_found
>= sk
->nr_items
) {
1669 test
.objectid
= sk
->max_objectid
;
1670 test
.type
= sk
->max_type
;
1671 test
.offset
= sk
->max_offset
;
1672 if (btrfs_comp_cpu_keys(key
, &test
) >= 0)
1674 else if (key
->offset
< (u64
)-1)
1676 else if (key
->type
< (u8
)-1) {
1679 } else if (key
->objectid
< (u64
)-1) {
1687 * 0: all items from this leaf copied, continue with next
1688 * 1: * more items can be copied, but unused buffer is too small
1689 * * all items were found
1690 * Either way, it will stops the loop which iterates to the next
1692 * -EOVERFLOW: item was to large for buffer
1693 * -EFAULT: could not copy extent buffer back to userspace
1698 static noinline
int search_ioctl(struct inode
*inode
,
1699 struct btrfs_ioctl_search_key
*sk
,
1703 struct btrfs_fs_info
*info
= inode_to_fs_info(inode
);
1704 struct btrfs_root
*root
;
1705 struct btrfs_key key
;
1706 struct btrfs_path
*path
;
1709 unsigned long sk_offset
= 0;
1711 if (*buf_size
< sizeof(struct btrfs_ioctl_search_header
)) {
1712 *buf_size
= sizeof(struct btrfs_ioctl_search_header
);
1716 path
= btrfs_alloc_path();
1720 if (sk
->tree_id
== 0) {
1721 /* search the root of the inode that was passed */
1722 root
= btrfs_grab_root(BTRFS_I(inode
)->root
);
1724 root
= btrfs_get_fs_root(info
, sk
->tree_id
, true);
1726 btrfs_free_path(path
);
1727 return PTR_ERR(root
);
1731 key
.objectid
= sk
->min_objectid
;
1732 key
.type
= sk
->min_type
;
1733 key
.offset
= sk
->min_offset
;
1738 * Ensure that the whole user buffer is faulted in at sub-page
1739 * granularity, otherwise the loop may live-lock.
1741 if (fault_in_subpage_writeable(ubuf
+ sk_offset
,
1742 *buf_size
- sk_offset
))
1745 ret
= btrfs_search_forward(root
, &key
, path
, sk
->min_transid
);
1751 ret
= copy_to_sk(path
, &key
, sk
, buf_size
, ubuf
,
1752 &sk_offset
, &num_found
);
1753 btrfs_release_path(path
);
1761 sk
->nr_items
= num_found
;
1762 btrfs_put_root(root
);
1763 btrfs_free_path(path
);
1767 static noinline
int btrfs_ioctl_tree_search(struct inode
*inode
,
1770 struct btrfs_ioctl_search_args __user
*uargs
= argp
;
1771 struct btrfs_ioctl_search_key sk
;
1775 if (!capable(CAP_SYS_ADMIN
))
1778 if (copy_from_user(&sk
, &uargs
->key
, sizeof(sk
)))
1781 buf_size
= sizeof(uargs
->buf
);
1783 ret
= search_ioctl(inode
, &sk
, &buf_size
, uargs
->buf
);
1786 * In the origin implementation an overflow is handled by returning a
1787 * search header with a len of zero, so reset ret.
1789 if (ret
== -EOVERFLOW
)
1792 if (ret
== 0 && copy_to_user(&uargs
->key
, &sk
, sizeof(sk
)))
1797 static noinline
int btrfs_ioctl_tree_search_v2(struct inode
*inode
,
1800 struct btrfs_ioctl_search_args_v2 __user
*uarg
= argp
;
1801 struct btrfs_ioctl_search_args_v2 args
;
1804 const u64 buf_limit
= SZ_16M
;
1806 if (!capable(CAP_SYS_ADMIN
))
1809 /* copy search header and buffer size */
1810 if (copy_from_user(&args
, uarg
, sizeof(args
)))
1813 buf_size
= args
.buf_size
;
1815 /* limit result size to 16MB */
1816 if (buf_size
> buf_limit
)
1817 buf_size
= buf_limit
;
1819 ret
= search_ioctl(inode
, &args
.key
, &buf_size
,
1820 (char __user
*)(&uarg
->buf
[0]));
1821 if (ret
== 0 && copy_to_user(&uarg
->key
, &args
.key
, sizeof(args
.key
)))
1823 else if (ret
== -EOVERFLOW
&&
1824 copy_to_user(&uarg
->buf_size
, &buf_size
, sizeof(buf_size
)))
1831 * Search INODE_REFs to identify path name of 'dirid' directory
1832 * in a 'tree_id' tree. and sets path name to 'name'.
1834 static noinline
int btrfs_search_path_in_tree(struct btrfs_fs_info
*info
,
1835 u64 tree_id
, u64 dirid
, char *name
)
1837 struct btrfs_root
*root
;
1838 struct btrfs_key key
;
1844 struct btrfs_inode_ref
*iref
;
1845 struct extent_buffer
*l
;
1846 struct btrfs_path
*path
;
1848 if (dirid
== BTRFS_FIRST_FREE_OBJECTID
) {
1853 path
= btrfs_alloc_path();
1857 ptr
= &name
[BTRFS_INO_LOOKUP_PATH_MAX
- 1];
1859 root
= btrfs_get_fs_root(info
, tree_id
, true);
1861 ret
= PTR_ERR(root
);
1866 key
.objectid
= dirid
;
1867 key
.type
= BTRFS_INODE_REF_KEY
;
1868 key
.offset
= (u64
)-1;
1871 ret
= btrfs_search_backwards(root
, &key
, path
);
1880 slot
= path
->slots
[0];
1882 iref
= btrfs_item_ptr(l
, slot
, struct btrfs_inode_ref
);
1883 len
= btrfs_inode_ref_name_len(l
, iref
);
1885 total_len
+= len
+ 1;
1887 ret
= -ENAMETOOLONG
;
1892 read_extent_buffer(l
, ptr
, (unsigned long)(iref
+ 1), len
);
1894 if (key
.offset
== BTRFS_FIRST_FREE_OBJECTID
)
1897 btrfs_release_path(path
);
1898 key
.objectid
= key
.offset
;
1899 key
.offset
= (u64
)-1;
1900 dirid
= key
.objectid
;
1902 memmove(name
, ptr
, total_len
);
1903 name
[total_len
] = '\0';
1906 btrfs_put_root(root
);
1907 btrfs_free_path(path
);
1911 static int btrfs_search_path_in_tree_user(struct mnt_idmap
*idmap
,
1912 struct inode
*inode
,
1913 struct btrfs_ioctl_ino_lookup_user_args
*args
)
1915 struct btrfs_fs_info
*fs_info
= BTRFS_I(inode
)->root
->fs_info
;
1916 u64 upper_limit
= btrfs_ino(BTRFS_I(inode
));
1917 u64 treeid
= btrfs_root_id(BTRFS_I(inode
)->root
);
1918 u64 dirid
= args
->dirid
;
1919 unsigned long item_off
;
1920 unsigned long item_len
;
1921 struct btrfs_inode_ref
*iref
;
1922 struct btrfs_root_ref
*rref
;
1923 struct btrfs_root
*root
= NULL
;
1924 struct btrfs_path
*path
;
1925 struct btrfs_key key
, key2
;
1926 struct extent_buffer
*leaf
;
1927 struct inode
*temp_inode
;
1934 path
= btrfs_alloc_path();
1939 * If the bottom subvolume does not exist directly under upper_limit,
1940 * construct the path in from the bottom up.
1942 if (dirid
!= upper_limit
) {
1943 ptr
= &args
->path
[BTRFS_INO_LOOKUP_USER_PATH_MAX
- 1];
1945 root
= btrfs_get_fs_root(fs_info
, treeid
, true);
1947 ret
= PTR_ERR(root
);
1951 key
.objectid
= dirid
;
1952 key
.type
= BTRFS_INODE_REF_KEY
;
1953 key
.offset
= (u64
)-1;
1955 ret
= btrfs_search_backwards(root
, &key
, path
);
1963 leaf
= path
->nodes
[0];
1964 slot
= path
->slots
[0];
1966 iref
= btrfs_item_ptr(leaf
, slot
, struct btrfs_inode_ref
);
1967 len
= btrfs_inode_ref_name_len(leaf
, iref
);
1969 total_len
+= len
+ 1;
1970 if (ptr
< args
->path
) {
1971 ret
= -ENAMETOOLONG
;
1976 read_extent_buffer(leaf
, ptr
,
1977 (unsigned long)(iref
+ 1), len
);
1979 /* Check the read+exec permission of this directory */
1980 ret
= btrfs_previous_item(root
, path
, dirid
,
1981 BTRFS_INODE_ITEM_KEY
);
1984 } else if (ret
> 0) {
1989 leaf
= path
->nodes
[0];
1990 slot
= path
->slots
[0];
1991 btrfs_item_key_to_cpu(leaf
, &key2
, slot
);
1992 if (key2
.objectid
!= dirid
) {
1998 * We don't need the path anymore, so release it and
1999 * avoid deadlocks and lockdep warnings in case
2000 * btrfs_iget() needs to lookup the inode from its root
2001 * btree and lock the same leaf.
2003 btrfs_release_path(path
);
2004 temp_inode
= btrfs_iget(key2
.objectid
, root
);
2005 if (IS_ERR(temp_inode
)) {
2006 ret
= PTR_ERR(temp_inode
);
2009 ret
= inode_permission(idmap
, temp_inode
,
2010 MAY_READ
| MAY_EXEC
);
2017 if (key
.offset
== upper_limit
)
2019 if (key
.objectid
== BTRFS_FIRST_FREE_OBJECTID
) {
2024 key
.objectid
= key
.offset
;
2025 key
.offset
= (u64
)-1;
2026 dirid
= key
.objectid
;
2029 memmove(args
->path
, ptr
, total_len
);
2030 args
->path
[total_len
] = '\0';
2031 btrfs_put_root(root
);
2033 btrfs_release_path(path
);
2036 /* Get the bottom subvolume's name from ROOT_REF */
2037 key
.objectid
= treeid
;
2038 key
.type
= BTRFS_ROOT_REF_KEY
;
2039 key
.offset
= args
->treeid
;
2040 ret
= btrfs_search_slot(NULL
, fs_info
->tree_root
, &key
, path
, 0, 0);
2043 } else if (ret
> 0) {
2048 leaf
= path
->nodes
[0];
2049 slot
= path
->slots
[0];
2050 btrfs_item_key_to_cpu(leaf
, &key
, slot
);
2052 item_off
= btrfs_item_ptr_offset(leaf
, slot
);
2053 item_len
= btrfs_item_size(leaf
, slot
);
2054 /* Check if dirid in ROOT_REF corresponds to passed dirid */
2055 rref
= btrfs_item_ptr(leaf
, slot
, struct btrfs_root_ref
);
2056 if (args
->dirid
!= btrfs_root_ref_dirid(leaf
, rref
)) {
2061 /* Copy subvolume's name */
2062 item_off
+= sizeof(struct btrfs_root_ref
);
2063 item_len
-= sizeof(struct btrfs_root_ref
);
2064 read_extent_buffer(leaf
, args
->name
, item_off
, item_len
);
2065 args
->name
[item_len
] = 0;
2068 btrfs_put_root(root
);
2070 btrfs_free_path(path
);
2074 static noinline
int btrfs_ioctl_ino_lookup(struct btrfs_root
*root
,
2077 struct btrfs_ioctl_ino_lookup_args
*args
;
2080 args
= memdup_user(argp
, sizeof(*args
));
2082 return PTR_ERR(args
);
2085 * Unprivileged query to obtain the containing subvolume root id. The
2086 * path is reset so it's consistent with btrfs_search_path_in_tree.
2088 if (args
->treeid
== 0)
2089 args
->treeid
= btrfs_root_id(root
);
2091 if (args
->objectid
== BTRFS_FIRST_FREE_OBJECTID
) {
2096 if (!capable(CAP_SYS_ADMIN
)) {
2101 ret
= btrfs_search_path_in_tree(root
->fs_info
,
2102 args
->treeid
, args
->objectid
,
2106 if (ret
== 0 && copy_to_user(argp
, args
, sizeof(*args
)))
2114 * Version of ino_lookup ioctl (unprivileged)
2116 * The main differences from ino_lookup ioctl are:
2118 * 1. Read + Exec permission will be checked using inode_permission() during
2119 * path construction. -EACCES will be returned in case of failure.
2120 * 2. Path construction will be stopped at the inode number which corresponds
2121 * to the fd with which this ioctl is called. If constructed path does not
2122 * exist under fd's inode, -EACCES will be returned.
2123 * 3. The name of bottom subvolume is also searched and filled.
2125 static int btrfs_ioctl_ino_lookup_user(struct file
*file
, void __user
*argp
)
2127 struct btrfs_ioctl_ino_lookup_user_args
*args
;
2128 struct inode
*inode
;
2131 args
= memdup_user(argp
, sizeof(*args
));
2133 return PTR_ERR(args
);
2135 inode
= file_inode(file
);
2137 if (args
->dirid
== BTRFS_FIRST_FREE_OBJECTID
&&
2138 btrfs_ino(BTRFS_I(inode
)) != BTRFS_FIRST_FREE_OBJECTID
) {
2140 * The subvolume does not exist under fd with which this is
2147 ret
= btrfs_search_path_in_tree_user(file_mnt_idmap(file
), inode
, args
);
2149 if (ret
== 0 && copy_to_user(argp
, args
, sizeof(*args
)))
2156 /* Get the subvolume information in BTRFS_ROOT_ITEM and BTRFS_ROOT_BACKREF */
2157 static int btrfs_ioctl_get_subvol_info(struct inode
*inode
, void __user
*argp
)
2159 struct btrfs_ioctl_get_subvol_info_args
*subvol_info
;
2160 struct btrfs_fs_info
*fs_info
;
2161 struct btrfs_root
*root
;
2162 struct btrfs_path
*path
;
2163 struct btrfs_key key
;
2164 struct btrfs_root_item
*root_item
;
2165 struct btrfs_root_ref
*rref
;
2166 struct extent_buffer
*leaf
;
2167 unsigned long item_off
;
2168 unsigned long item_len
;
2172 path
= btrfs_alloc_path();
2176 subvol_info
= kzalloc(sizeof(*subvol_info
), GFP_KERNEL
);
2178 btrfs_free_path(path
);
2182 fs_info
= BTRFS_I(inode
)->root
->fs_info
;
2184 /* Get root_item of inode's subvolume */
2185 key
.objectid
= btrfs_root_id(BTRFS_I(inode
)->root
);
2186 root
= btrfs_get_fs_root(fs_info
, key
.objectid
, true);
2188 ret
= PTR_ERR(root
);
2191 root_item
= &root
->root_item
;
2193 subvol_info
->treeid
= key
.objectid
;
2195 subvol_info
->generation
= btrfs_root_generation(root_item
);
2196 subvol_info
->flags
= btrfs_root_flags(root_item
);
2198 memcpy(subvol_info
->uuid
, root_item
->uuid
, BTRFS_UUID_SIZE
);
2199 memcpy(subvol_info
->parent_uuid
, root_item
->parent_uuid
,
2201 memcpy(subvol_info
->received_uuid
, root_item
->received_uuid
,
2204 subvol_info
->ctransid
= btrfs_root_ctransid(root_item
);
2205 subvol_info
->ctime
.sec
= btrfs_stack_timespec_sec(&root_item
->ctime
);
2206 subvol_info
->ctime
.nsec
= btrfs_stack_timespec_nsec(&root_item
->ctime
);
2208 subvol_info
->otransid
= btrfs_root_otransid(root_item
);
2209 subvol_info
->otime
.sec
= btrfs_stack_timespec_sec(&root_item
->otime
);
2210 subvol_info
->otime
.nsec
= btrfs_stack_timespec_nsec(&root_item
->otime
);
2212 subvol_info
->stransid
= btrfs_root_stransid(root_item
);
2213 subvol_info
->stime
.sec
= btrfs_stack_timespec_sec(&root_item
->stime
);
2214 subvol_info
->stime
.nsec
= btrfs_stack_timespec_nsec(&root_item
->stime
);
2216 subvol_info
->rtransid
= btrfs_root_rtransid(root_item
);
2217 subvol_info
->rtime
.sec
= btrfs_stack_timespec_sec(&root_item
->rtime
);
2218 subvol_info
->rtime
.nsec
= btrfs_stack_timespec_nsec(&root_item
->rtime
);
2220 if (key
.objectid
!= BTRFS_FS_TREE_OBJECTID
) {
2221 /* Search root tree for ROOT_BACKREF of this subvolume */
2222 key
.type
= BTRFS_ROOT_BACKREF_KEY
;
2224 ret
= btrfs_search_slot(NULL
, fs_info
->tree_root
, &key
, path
, 0, 0);
2227 } else if (path
->slots
[0] >=
2228 btrfs_header_nritems(path
->nodes
[0])) {
2229 ret
= btrfs_next_leaf(fs_info
->tree_root
, path
);
2232 } else if (ret
> 0) {
2238 leaf
= path
->nodes
[0];
2239 slot
= path
->slots
[0];
2240 btrfs_item_key_to_cpu(leaf
, &key
, slot
);
2241 if (key
.objectid
== subvol_info
->treeid
&&
2242 key
.type
== BTRFS_ROOT_BACKREF_KEY
) {
2243 subvol_info
->parent_id
= key
.offset
;
2245 rref
= btrfs_item_ptr(leaf
, slot
, struct btrfs_root_ref
);
2246 subvol_info
->dirid
= btrfs_root_ref_dirid(leaf
, rref
);
2248 item_off
= btrfs_item_ptr_offset(leaf
, slot
)
2249 + sizeof(struct btrfs_root_ref
);
2250 item_len
= btrfs_item_size(leaf
, slot
)
2251 - sizeof(struct btrfs_root_ref
);
2252 read_extent_buffer(leaf
, subvol_info
->name
,
2253 item_off
, item_len
);
2260 btrfs_free_path(path
);
2262 if (copy_to_user(argp
, subvol_info
, sizeof(*subvol_info
)))
2266 btrfs_put_root(root
);
2268 btrfs_free_path(path
);
2274 * Return ROOT_REF information of the subvolume containing this inode
2275 * except the subvolume name.
2277 static int btrfs_ioctl_get_subvol_rootref(struct btrfs_root
*root
,
2280 struct btrfs_ioctl_get_subvol_rootref_args
*rootrefs
;
2281 struct btrfs_root_ref
*rref
;
2282 struct btrfs_path
*path
;
2283 struct btrfs_key key
;
2284 struct extent_buffer
*leaf
;
2290 path
= btrfs_alloc_path();
2294 rootrefs
= memdup_user(argp
, sizeof(*rootrefs
));
2295 if (IS_ERR(rootrefs
)) {
2296 btrfs_free_path(path
);
2297 return PTR_ERR(rootrefs
);
2300 objectid
= btrfs_root_id(root
);
2301 key
.objectid
= objectid
;
2302 key
.type
= BTRFS_ROOT_REF_KEY
;
2303 key
.offset
= rootrefs
->min_treeid
;
2306 root
= root
->fs_info
->tree_root
;
2307 ret
= btrfs_search_slot(NULL
, root
, &key
, path
, 0, 0);
2310 } else if (path
->slots
[0] >=
2311 btrfs_header_nritems(path
->nodes
[0])) {
2312 ret
= btrfs_next_leaf(root
, path
);
2315 } else if (ret
> 0) {
2321 leaf
= path
->nodes
[0];
2322 slot
= path
->slots
[0];
2324 btrfs_item_key_to_cpu(leaf
, &key
, slot
);
2325 if (key
.objectid
!= objectid
|| key
.type
!= BTRFS_ROOT_REF_KEY
) {
2330 if (found
== BTRFS_MAX_ROOTREF_BUFFER_NUM
) {
2335 rref
= btrfs_item_ptr(leaf
, slot
, struct btrfs_root_ref
);
2336 rootrefs
->rootref
[found
].treeid
= key
.offset
;
2337 rootrefs
->rootref
[found
].dirid
=
2338 btrfs_root_ref_dirid(leaf
, rref
);
2341 ret
= btrfs_next_item(root
, path
);
2344 } else if (ret
> 0) {
2351 btrfs_free_path(path
);
2353 if (!ret
|| ret
== -EOVERFLOW
) {
2354 rootrefs
->num_items
= found
;
2355 /* update min_treeid for next search */
2357 rootrefs
->min_treeid
=
2358 rootrefs
->rootref
[found
- 1].treeid
+ 1;
2359 if (copy_to_user(argp
, rootrefs
, sizeof(*rootrefs
)))
2368 static noinline
int btrfs_ioctl_snap_destroy(struct file
*file
,
2372 struct dentry
*parent
= file
->f_path
.dentry
;
2373 struct dentry
*dentry
;
2374 struct inode
*dir
= d_inode(parent
);
2375 struct btrfs_fs_info
*fs_info
= inode_to_fs_info(dir
);
2376 struct inode
*inode
;
2377 struct btrfs_root
*root
= BTRFS_I(dir
)->root
;
2378 struct btrfs_root
*dest
= NULL
;
2379 struct btrfs_ioctl_vol_args
*vol_args
= NULL
;
2380 struct btrfs_ioctl_vol_args_v2
*vol_args2
= NULL
;
2381 struct mnt_idmap
*idmap
= file_mnt_idmap(file
);
2382 char *subvol_name
, *subvol_name_ptr
= NULL
;
2385 bool destroy_parent
= false;
2387 /* We don't support snapshots with extent tree v2 yet. */
2388 if (btrfs_fs_incompat(fs_info
, EXTENT_TREE_V2
)) {
2390 "extent tree v2 doesn't support snapshot deletion yet");
2395 vol_args2
= memdup_user(arg
, sizeof(*vol_args2
));
2396 if (IS_ERR(vol_args2
))
2397 return PTR_ERR(vol_args2
);
2399 if (vol_args2
->flags
& ~BTRFS_SUBVOL_DELETE_ARGS_MASK
) {
2405 * If SPEC_BY_ID is not set, we are looking for the subvolume by
2406 * name, same as v1 currently does.
2408 if (!(vol_args2
->flags
& BTRFS_SUBVOL_SPEC_BY_ID
)) {
2409 ret
= btrfs_check_ioctl_vol_args2_subvol_name(vol_args2
);
2412 subvol_name
= vol_args2
->name
;
2414 ret
= mnt_want_write_file(file
);
2418 struct inode
*old_dir
;
2420 if (vol_args2
->subvolid
< BTRFS_FIRST_FREE_OBJECTID
) {
2425 ret
= mnt_want_write_file(file
);
2429 dentry
= btrfs_get_dentry(fs_info
->sb
,
2430 BTRFS_FIRST_FREE_OBJECTID
,
2431 vol_args2
->subvolid
, 0);
2432 if (IS_ERR(dentry
)) {
2433 ret
= PTR_ERR(dentry
);
2434 goto out_drop_write
;
2438 * Change the default parent since the subvolume being
2439 * deleted can be outside of the current mount point.
2441 parent
= btrfs_get_parent(dentry
);
2444 * At this point dentry->d_name can point to '/' if the
2445 * subvolume we want to destroy is outsite of the
2446 * current mount point, so we need to release the
2447 * current dentry and execute the lookup to return a new
2448 * one with ->d_name pointing to the
2449 * <mount point>/subvol_name.
2452 if (IS_ERR(parent
)) {
2453 ret
= PTR_ERR(parent
);
2454 goto out_drop_write
;
2457 dir
= d_inode(parent
);
2460 * If v2 was used with SPEC_BY_ID, a new parent was
2461 * allocated since the subvolume can be outside of the
2462 * current mount point. Later on we need to release this
2463 * new parent dentry.
2465 destroy_parent
= true;
2468 * On idmapped mounts, deletion via subvolid is
2469 * restricted to subvolumes that are immediate
2470 * ancestors of the inode referenced by the file
2471 * descriptor in the ioctl. Otherwise the idmapping
2472 * could potentially be abused to delete subvolumes
2473 * anywhere in the filesystem the user wouldn't be able
2474 * to delete without an idmapped mount.
2476 if (old_dir
!= dir
&& idmap
!= &nop_mnt_idmap
) {
2481 subvol_name_ptr
= btrfs_get_subvol_name_from_objectid(
2482 fs_info
, vol_args2
->subvolid
);
2483 if (IS_ERR(subvol_name_ptr
)) {
2484 ret
= PTR_ERR(subvol_name_ptr
);
2487 /* subvol_name_ptr is already nul terminated */
2488 subvol_name
= (char *)kbasename(subvol_name_ptr
);
2491 vol_args
= memdup_user(arg
, sizeof(*vol_args
));
2492 if (IS_ERR(vol_args
))
2493 return PTR_ERR(vol_args
);
2495 ret
= btrfs_check_ioctl_vol_args_path(vol_args
);
2499 subvol_name
= vol_args
->name
;
2501 ret
= mnt_want_write_file(file
);
2506 subvol_namelen
= strlen(subvol_name
);
2508 if (strchr(subvol_name
, '/') ||
2509 strncmp(subvol_name
, "..", subvol_namelen
) == 0) {
2511 goto free_subvol_name
;
2514 if (!S_ISDIR(dir
->i_mode
)) {
2516 goto free_subvol_name
;
2519 ret
= down_write_killable_nested(&dir
->i_rwsem
, I_MUTEX_PARENT
);
2521 goto free_subvol_name
;
2522 dentry
= lookup_one(idmap
, subvol_name
, parent
, subvol_namelen
);
2523 if (IS_ERR(dentry
)) {
2524 ret
= PTR_ERR(dentry
);
2525 goto out_unlock_dir
;
2528 if (d_really_is_negative(dentry
)) {
2533 inode
= d_inode(dentry
);
2534 dest
= BTRFS_I(inode
)->root
;
2535 if (!capable(CAP_SYS_ADMIN
)) {
2537 * Regular user. Only allow this with a special mount
2538 * option, when the user has write+exec access to the
2539 * subvol root, and when rmdir(2) would have been
2542 * Note that this is _not_ check that the subvol is
2543 * empty or doesn't contain data that we wouldn't
2544 * otherwise be able to delete.
2546 * Users who want to delete empty subvols should try
2550 if (!btrfs_test_opt(fs_info
, USER_SUBVOL_RM_ALLOWED
))
2554 * Do not allow deletion if the parent dir is the same
2555 * as the dir to be deleted. That means the ioctl
2556 * must be called on the dentry referencing the root
2557 * of the subvol, not a random directory contained
2564 ret
= inode_permission(idmap
, inode
, MAY_WRITE
| MAY_EXEC
);
2569 /* check if subvolume may be deleted by a user */
2570 ret
= btrfs_may_delete(idmap
, dir
, dentry
, 1);
2574 if (btrfs_ino(BTRFS_I(inode
)) != BTRFS_FIRST_FREE_OBJECTID
) {
2579 btrfs_inode_lock(BTRFS_I(inode
), 0);
2580 ret
= btrfs_delete_subvolume(BTRFS_I(dir
), dentry
);
2581 btrfs_inode_unlock(BTRFS_I(inode
), 0);
2583 d_delete_notify(dir
, dentry
);
2588 btrfs_inode_unlock(BTRFS_I(dir
), 0);
2590 kfree(subvol_name_ptr
);
2595 mnt_drop_write_file(file
);
2602 static int btrfs_ioctl_defrag(struct file
*file
, void __user
*argp
)
2604 struct inode
*inode
= file_inode(file
);
2605 struct btrfs_root
*root
= BTRFS_I(inode
)->root
;
2606 struct btrfs_ioctl_defrag_range_args range
= {0};
2609 ret
= mnt_want_write_file(file
);
2613 if (btrfs_root_readonly(root
)) {
2618 switch (inode
->i_mode
& S_IFMT
) {
2620 if (!capable(CAP_SYS_ADMIN
)) {
2624 ret
= btrfs_defrag_root(root
);
2628 * Note that this does not check the file descriptor for write
2629 * access. This prevents defragmenting executables that are
2630 * running and allows defrag on files open in read-only mode.
2632 if (!capable(CAP_SYS_ADMIN
) &&
2633 inode_permission(&nop_mnt_idmap
, inode
, MAY_WRITE
)) {
2639 if (copy_from_user(&range
, argp
, sizeof(range
))) {
2643 if (range
.flags
& ~BTRFS_DEFRAG_RANGE_FLAGS_SUPP
) {
2647 /* compression requires us to start the IO */
2648 if ((range
.flags
& BTRFS_DEFRAG_RANGE_COMPRESS
)) {
2649 range
.flags
|= BTRFS_DEFRAG_RANGE_START_IO
;
2650 range
.extent_thresh
= (u32
)-1;
2653 /* the rest are all set to zero by kzalloc */
2654 range
.len
= (u64
)-1;
2656 ret
= btrfs_defrag_file(file_inode(file
), &file
->f_ra
,
2657 &range
, BTRFS_OLDEST_GENERATION
, 0);
2665 mnt_drop_write_file(file
);
2669 static long btrfs_ioctl_add_dev(struct btrfs_fs_info
*fs_info
, void __user
*arg
)
2671 struct btrfs_ioctl_vol_args
*vol_args
;
2672 bool restore_op
= false;
2675 if (!capable(CAP_SYS_ADMIN
))
2678 if (btrfs_fs_incompat(fs_info
, EXTENT_TREE_V2
)) {
2679 btrfs_err(fs_info
, "device add not supported on extent tree v2 yet");
2683 if (fs_info
->fs_devices
->temp_fsid
) {
2685 "device add not supported on cloned temp-fsid mount");
2689 if (!btrfs_exclop_start(fs_info
, BTRFS_EXCLOP_DEV_ADD
)) {
2690 if (!btrfs_exclop_start_try_lock(fs_info
, BTRFS_EXCLOP_DEV_ADD
))
2691 return BTRFS_ERROR_DEV_EXCL_RUN_IN_PROGRESS
;
2694 * We can do the device add because we have a paused balanced,
2695 * change the exclusive op type and remember we should bring
2696 * back the paused balance
2698 fs_info
->exclusive_operation
= BTRFS_EXCLOP_DEV_ADD
;
2699 btrfs_exclop_start_unlock(fs_info
);
2703 vol_args
= memdup_user(arg
, sizeof(*vol_args
));
2704 if (IS_ERR(vol_args
)) {
2705 ret
= PTR_ERR(vol_args
);
2709 ret
= btrfs_check_ioctl_vol_args_path(vol_args
);
2713 ret
= btrfs_init_new_device(fs_info
, vol_args
->name
);
2716 btrfs_info(fs_info
, "disk added %s", vol_args
->name
);
2722 btrfs_exclop_balance(fs_info
, BTRFS_EXCLOP_BALANCE_PAUSED
);
2724 btrfs_exclop_finish(fs_info
);
2728 static long btrfs_ioctl_rm_dev_v2(struct file
*file
, void __user
*arg
)
2730 BTRFS_DEV_LOOKUP_ARGS(args
);
2731 struct inode
*inode
= file_inode(file
);
2732 struct btrfs_fs_info
*fs_info
= inode_to_fs_info(inode
);
2733 struct btrfs_ioctl_vol_args_v2
*vol_args
;
2734 struct file
*bdev_file
= NULL
;
2736 bool cancel
= false;
2738 if (!capable(CAP_SYS_ADMIN
))
2741 vol_args
= memdup_user(arg
, sizeof(*vol_args
));
2742 if (IS_ERR(vol_args
))
2743 return PTR_ERR(vol_args
);
2745 if (vol_args
->flags
& ~BTRFS_DEVICE_REMOVE_ARGS_MASK
) {
2750 ret
= btrfs_check_ioctl_vol_args2_subvol_name(vol_args
);
2754 if (vol_args
->flags
& BTRFS_DEVICE_SPEC_BY_ID
) {
2755 args
.devid
= vol_args
->devid
;
2756 } else if (!strcmp("cancel", vol_args
->name
)) {
2759 ret
= btrfs_get_dev_args_from_path(fs_info
, &args
, vol_args
->name
);
2764 ret
= mnt_want_write_file(file
);
2768 ret
= exclop_start_or_cancel_reloc(fs_info
, BTRFS_EXCLOP_DEV_REMOVE
,
2773 /* Exclusive operation is now claimed */
2774 ret
= btrfs_rm_device(fs_info
, &args
, &bdev_file
);
2776 btrfs_exclop_finish(fs_info
);
2779 if (vol_args
->flags
& BTRFS_DEVICE_SPEC_BY_ID
)
2780 btrfs_info(fs_info
, "device deleted: id %llu",
2783 btrfs_info(fs_info
, "device deleted: %s",
2787 mnt_drop_write_file(file
);
2791 btrfs_put_dev_args_from_path(&args
);
2796 static long btrfs_ioctl_rm_dev(struct file
*file
, void __user
*arg
)
2798 BTRFS_DEV_LOOKUP_ARGS(args
);
2799 struct inode
*inode
= file_inode(file
);
2800 struct btrfs_fs_info
*fs_info
= inode_to_fs_info(inode
);
2801 struct btrfs_ioctl_vol_args
*vol_args
;
2802 struct file
*bdev_file
= NULL
;
2804 bool cancel
= false;
2806 if (!capable(CAP_SYS_ADMIN
))
2809 vol_args
= memdup_user(arg
, sizeof(*vol_args
));
2810 if (IS_ERR(vol_args
))
2811 return PTR_ERR(vol_args
);
2813 ret
= btrfs_check_ioctl_vol_args_path(vol_args
);
2817 if (!strcmp("cancel", vol_args
->name
)) {
2820 ret
= btrfs_get_dev_args_from_path(fs_info
, &args
, vol_args
->name
);
2825 ret
= mnt_want_write_file(file
);
2829 ret
= exclop_start_or_cancel_reloc(fs_info
, BTRFS_EXCLOP_DEV_REMOVE
,
2832 ret
= btrfs_rm_device(fs_info
, &args
, &bdev_file
);
2834 btrfs_info(fs_info
, "disk deleted %s", vol_args
->name
);
2835 btrfs_exclop_finish(fs_info
);
2838 mnt_drop_write_file(file
);
2842 btrfs_put_dev_args_from_path(&args
);
2848 static long btrfs_ioctl_fs_info(struct btrfs_fs_info
*fs_info
,
2851 struct btrfs_ioctl_fs_info_args
*fi_args
;
2852 struct btrfs_device
*device
;
2853 struct btrfs_fs_devices
*fs_devices
= fs_info
->fs_devices
;
2857 fi_args
= memdup_user(arg
, sizeof(*fi_args
));
2858 if (IS_ERR(fi_args
))
2859 return PTR_ERR(fi_args
);
2861 flags_in
= fi_args
->flags
;
2862 memset(fi_args
, 0, sizeof(*fi_args
));
2865 fi_args
->num_devices
= fs_devices
->num_devices
;
2867 list_for_each_entry_rcu(device
, &fs_devices
->devices
, dev_list
) {
2868 if (device
->devid
> fi_args
->max_id
)
2869 fi_args
->max_id
= device
->devid
;
2873 memcpy(&fi_args
->fsid
, fs_devices
->fsid
, sizeof(fi_args
->fsid
));
2874 fi_args
->nodesize
= fs_info
->nodesize
;
2875 fi_args
->sectorsize
= fs_info
->sectorsize
;
2876 fi_args
->clone_alignment
= fs_info
->sectorsize
;
2878 if (flags_in
& BTRFS_FS_INFO_FLAG_CSUM_INFO
) {
2879 fi_args
->csum_type
= btrfs_super_csum_type(fs_info
->super_copy
);
2880 fi_args
->csum_size
= btrfs_super_csum_size(fs_info
->super_copy
);
2881 fi_args
->flags
|= BTRFS_FS_INFO_FLAG_CSUM_INFO
;
2884 if (flags_in
& BTRFS_FS_INFO_FLAG_GENERATION
) {
2885 fi_args
->generation
= btrfs_get_fs_generation(fs_info
);
2886 fi_args
->flags
|= BTRFS_FS_INFO_FLAG_GENERATION
;
2889 if (flags_in
& BTRFS_FS_INFO_FLAG_METADATA_UUID
) {
2890 memcpy(&fi_args
->metadata_uuid
, fs_devices
->metadata_uuid
,
2891 sizeof(fi_args
->metadata_uuid
));
2892 fi_args
->flags
|= BTRFS_FS_INFO_FLAG_METADATA_UUID
;
2895 if (copy_to_user(arg
, fi_args
, sizeof(*fi_args
)))
2902 static long btrfs_ioctl_dev_info(struct btrfs_fs_info
*fs_info
,
2905 BTRFS_DEV_LOOKUP_ARGS(args
);
2906 struct btrfs_ioctl_dev_info_args
*di_args
;
2907 struct btrfs_device
*dev
;
2910 di_args
= memdup_user(arg
, sizeof(*di_args
));
2911 if (IS_ERR(di_args
))
2912 return PTR_ERR(di_args
);
2914 args
.devid
= di_args
->devid
;
2915 if (!btrfs_is_empty_uuid(di_args
->uuid
))
2916 args
.uuid
= di_args
->uuid
;
2919 dev
= btrfs_find_device(fs_info
->fs_devices
, &args
);
2925 di_args
->devid
= dev
->devid
;
2926 di_args
->bytes_used
= btrfs_device_get_bytes_used(dev
);
2927 di_args
->total_bytes
= btrfs_device_get_total_bytes(dev
);
2928 memcpy(di_args
->uuid
, dev
->uuid
, sizeof(di_args
->uuid
));
2929 memcpy(di_args
->fsid
, dev
->fs_devices
->fsid
, BTRFS_UUID_SIZE
);
2931 strscpy(di_args
->path
, btrfs_dev_name(dev
), sizeof(di_args
->path
));
2933 di_args
->path
[0] = '\0';
2937 if (ret
== 0 && copy_to_user(arg
, di_args
, sizeof(*di_args
)))
2944 static long btrfs_ioctl_default_subvol(struct file
*file
, void __user
*argp
)
2946 struct inode
*inode
= file_inode(file
);
2947 struct btrfs_fs_info
*fs_info
= inode_to_fs_info(inode
);
2948 struct btrfs_root
*root
= BTRFS_I(inode
)->root
;
2949 struct btrfs_root
*new_root
;
2950 struct btrfs_dir_item
*di
;
2951 struct btrfs_trans_handle
*trans
;
2952 struct btrfs_path
*path
= NULL
;
2953 struct btrfs_disk_key disk_key
;
2954 struct fscrypt_str name
= FSTR_INIT("default", 7);
2959 if (!capable(CAP_SYS_ADMIN
))
2962 ret
= mnt_want_write_file(file
);
2966 if (copy_from_user(&objectid
, argp
, sizeof(objectid
))) {
2972 objectid
= BTRFS_FS_TREE_OBJECTID
;
2974 new_root
= btrfs_get_fs_root(fs_info
, objectid
, true);
2975 if (IS_ERR(new_root
)) {
2976 ret
= PTR_ERR(new_root
);
2979 if (!is_fstree(btrfs_root_id(new_root
))) {
2984 path
= btrfs_alloc_path();
2990 trans
= btrfs_start_transaction(root
, 1);
2991 if (IS_ERR(trans
)) {
2992 ret
= PTR_ERR(trans
);
2996 dir_id
= btrfs_super_root_dir(fs_info
->super_copy
);
2997 di
= btrfs_lookup_dir_item(trans
, fs_info
->tree_root
, path
,
2999 if (IS_ERR_OR_NULL(di
)) {
3000 btrfs_release_path(path
);
3001 btrfs_end_transaction(trans
);
3003 "Umm, you don't have the default diritem, this isn't going to work");
3008 btrfs_cpu_key_to_disk(&disk_key
, &new_root
->root_key
);
3009 btrfs_set_dir_item_key(path
->nodes
[0], di
, &disk_key
);
3010 btrfs_mark_buffer_dirty(trans
, path
->nodes
[0]);
3011 btrfs_release_path(path
);
3013 btrfs_set_fs_incompat(fs_info
, DEFAULT_SUBVOL
);
3014 btrfs_end_transaction(trans
);
3016 btrfs_put_root(new_root
);
3017 btrfs_free_path(path
);
3019 mnt_drop_write_file(file
);
3023 static void get_block_group_info(struct list_head
*groups_list
,
3024 struct btrfs_ioctl_space_info
*space
)
3026 struct btrfs_block_group
*block_group
;
3028 space
->total_bytes
= 0;
3029 space
->used_bytes
= 0;
3031 list_for_each_entry(block_group
, groups_list
, list
) {
3032 space
->flags
= block_group
->flags
;
3033 space
->total_bytes
+= block_group
->length
;
3034 space
->used_bytes
+= block_group
->used
;
3038 static long btrfs_ioctl_space_info(struct btrfs_fs_info
*fs_info
,
3041 struct btrfs_ioctl_space_args space_args
= { 0 };
3042 struct btrfs_ioctl_space_info space
;
3043 struct btrfs_ioctl_space_info
*dest
;
3044 struct btrfs_ioctl_space_info
*dest_orig
;
3045 struct btrfs_ioctl_space_info __user
*user_dest
;
3046 struct btrfs_space_info
*info
;
3047 static const u64 types
[] = {
3048 BTRFS_BLOCK_GROUP_DATA
,
3049 BTRFS_BLOCK_GROUP_SYSTEM
,
3050 BTRFS_BLOCK_GROUP_METADATA
,
3051 BTRFS_BLOCK_GROUP_DATA
| BTRFS_BLOCK_GROUP_METADATA
3059 if (copy_from_user(&space_args
,
3060 (struct btrfs_ioctl_space_args __user
*)arg
,
3061 sizeof(space_args
)))
3064 for (i
= 0; i
< num_types
; i
++) {
3065 struct btrfs_space_info
*tmp
;
3068 list_for_each_entry(tmp
, &fs_info
->space_info
, list
) {
3069 if (tmp
->flags
== types
[i
]) {
3078 down_read(&info
->groups_sem
);
3079 for (c
= 0; c
< BTRFS_NR_RAID_TYPES
; c
++) {
3080 if (!list_empty(&info
->block_groups
[c
]))
3083 up_read(&info
->groups_sem
);
3087 * Global block reserve, exported as a space_info
3091 /* space_slots == 0 means they are asking for a count */
3092 if (space_args
.space_slots
== 0) {
3093 space_args
.total_spaces
= slot_count
;
3097 slot_count
= min_t(u64
, space_args
.space_slots
, slot_count
);
3099 alloc_size
= sizeof(*dest
) * slot_count
;
3101 /* we generally have at most 6 or so space infos, one for each raid
3102 * level. So, a whole page should be more than enough for everyone
3104 if (alloc_size
> PAGE_SIZE
)
3107 space_args
.total_spaces
= 0;
3108 dest
= kmalloc(alloc_size
, GFP_KERNEL
);
3113 /* now we have a buffer to copy into */
3114 for (i
= 0; i
< num_types
; i
++) {
3115 struct btrfs_space_info
*tmp
;
3121 list_for_each_entry(tmp
, &fs_info
->space_info
, list
) {
3122 if (tmp
->flags
== types
[i
]) {
3130 down_read(&info
->groups_sem
);
3131 for (c
= 0; c
< BTRFS_NR_RAID_TYPES
; c
++) {
3132 if (!list_empty(&info
->block_groups
[c
])) {
3133 get_block_group_info(&info
->block_groups
[c
],
3135 memcpy(dest
, &space
, sizeof(space
));
3137 space_args
.total_spaces
++;
3143 up_read(&info
->groups_sem
);
3147 * Add global block reserve
3150 struct btrfs_block_rsv
*block_rsv
= &fs_info
->global_block_rsv
;
3152 spin_lock(&block_rsv
->lock
);
3153 space
.total_bytes
= block_rsv
->size
;
3154 space
.used_bytes
= block_rsv
->size
- block_rsv
->reserved
;
3155 spin_unlock(&block_rsv
->lock
);
3156 space
.flags
= BTRFS_SPACE_INFO_GLOBAL_RSV
;
3157 memcpy(dest
, &space
, sizeof(space
));
3158 space_args
.total_spaces
++;
3161 user_dest
= (struct btrfs_ioctl_space_info __user
*)
3162 (arg
+ sizeof(struct btrfs_ioctl_space_args
));
3164 if (copy_to_user(user_dest
, dest_orig
, alloc_size
))
3169 if (ret
== 0 && copy_to_user(arg
, &space_args
, sizeof(space_args
)))
3175 static noinline
long btrfs_ioctl_start_sync(struct btrfs_root
*root
,
3178 struct btrfs_trans_handle
*trans
;
3182 * Start orphan cleanup here for the given root in case it hasn't been
3183 * started already by other means. Errors are handled in the other
3184 * functions during transaction commit.
3186 btrfs_orphan_cleanup(root
);
3188 trans
= btrfs_attach_transaction_barrier(root
);
3189 if (IS_ERR(trans
)) {
3190 if (PTR_ERR(trans
) != -ENOENT
)
3191 return PTR_ERR(trans
);
3193 /* No running transaction, don't bother */
3194 transid
= btrfs_get_last_trans_committed(root
->fs_info
);
3197 transid
= trans
->transid
;
3198 btrfs_commit_transaction_async(trans
);
3201 if (copy_to_user(argp
, &transid
, sizeof(transid
)))
3206 static noinline
long btrfs_ioctl_wait_sync(struct btrfs_fs_info
*fs_info
,
3209 /* By default wait for the current transaction. */
3213 if (copy_from_user(&transid
, argp
, sizeof(transid
)))
3216 return btrfs_wait_for_commit(fs_info
, transid
);
3219 static long btrfs_ioctl_scrub(struct file
*file
, void __user
*arg
)
3221 struct btrfs_fs_info
*fs_info
= inode_to_fs_info(file_inode(file
));
3222 struct btrfs_ioctl_scrub_args
*sa
;
3225 if (!capable(CAP_SYS_ADMIN
))
3228 if (btrfs_fs_incompat(fs_info
, EXTENT_TREE_V2
)) {
3229 btrfs_err(fs_info
, "scrub is not supported on extent tree v2 yet");
3233 sa
= memdup_user(arg
, sizeof(*sa
));
3237 if (sa
->flags
& ~BTRFS_SCRUB_SUPPORTED_FLAGS
) {
3242 if (!(sa
->flags
& BTRFS_SCRUB_READONLY
)) {
3243 ret
= mnt_want_write_file(file
);
3248 ret
= btrfs_scrub_dev(fs_info
, sa
->devid
, sa
->start
, sa
->end
,
3249 &sa
->progress
, sa
->flags
& BTRFS_SCRUB_READONLY
,
3253 * Copy scrub args to user space even if btrfs_scrub_dev() returned an
3254 * error. This is important as it allows user space to know how much
3255 * progress scrub has done. For example, if scrub is canceled we get
3256 * -ECANCELED from btrfs_scrub_dev() and return that error back to user
3257 * space. Later user space can inspect the progress from the structure
3258 * btrfs_ioctl_scrub_args and resume scrub from where it left off
3259 * previously (btrfs-progs does this).
3260 * If we fail to copy the btrfs_ioctl_scrub_args structure to user space
3261 * then return -EFAULT to signal the structure was not copied or it may
3262 * be corrupt and unreliable due to a partial copy.
3264 if (copy_to_user(arg
, sa
, sizeof(*sa
)))
3267 if (!(sa
->flags
& BTRFS_SCRUB_READONLY
))
3268 mnt_drop_write_file(file
);
3274 static long btrfs_ioctl_scrub_cancel(struct btrfs_fs_info
*fs_info
)
3276 if (!capable(CAP_SYS_ADMIN
))
3279 return btrfs_scrub_cancel(fs_info
);
3282 static long btrfs_ioctl_scrub_progress(struct btrfs_fs_info
*fs_info
,
3285 struct btrfs_ioctl_scrub_args
*sa
;
3288 if (!capable(CAP_SYS_ADMIN
))
3291 sa
= memdup_user(arg
, sizeof(*sa
));
3295 ret
= btrfs_scrub_progress(fs_info
, sa
->devid
, &sa
->progress
);
3297 if (ret
== 0 && copy_to_user(arg
, sa
, sizeof(*sa
)))
3304 static long btrfs_ioctl_get_dev_stats(struct btrfs_fs_info
*fs_info
,
3307 struct btrfs_ioctl_get_dev_stats
*sa
;
3310 sa
= memdup_user(arg
, sizeof(*sa
));
3314 if ((sa
->flags
& BTRFS_DEV_STATS_RESET
) && !capable(CAP_SYS_ADMIN
)) {
3319 ret
= btrfs_get_dev_stats(fs_info
, sa
);
3321 if (ret
== 0 && copy_to_user(arg
, sa
, sizeof(*sa
)))
3328 static long btrfs_ioctl_dev_replace(struct btrfs_fs_info
*fs_info
,
3331 struct btrfs_ioctl_dev_replace_args
*p
;
3334 if (!capable(CAP_SYS_ADMIN
))
3337 if (btrfs_fs_incompat(fs_info
, EXTENT_TREE_V2
)) {
3338 btrfs_err(fs_info
, "device replace not supported on extent tree v2 yet");
3342 p
= memdup_user(arg
, sizeof(*p
));
3347 case BTRFS_IOCTL_DEV_REPLACE_CMD_START
:
3348 if (sb_rdonly(fs_info
->sb
)) {
3352 if (!btrfs_exclop_start(fs_info
, BTRFS_EXCLOP_DEV_REPLACE
)) {
3353 ret
= BTRFS_ERROR_DEV_EXCL_RUN_IN_PROGRESS
;
3355 ret
= btrfs_dev_replace_by_ioctl(fs_info
, p
);
3356 btrfs_exclop_finish(fs_info
);
3359 case BTRFS_IOCTL_DEV_REPLACE_CMD_STATUS
:
3360 btrfs_dev_replace_status(fs_info
, p
);
3363 case BTRFS_IOCTL_DEV_REPLACE_CMD_CANCEL
:
3364 p
->result
= btrfs_dev_replace_cancel(fs_info
);
3372 if ((ret
== 0 || ret
== -ECANCELED
) && copy_to_user(arg
, p
, sizeof(*p
)))
3379 static long btrfs_ioctl_ino_to_path(struct btrfs_root
*root
, void __user
*arg
)
3385 struct btrfs_ioctl_ino_path_args
*ipa
= NULL
;
3386 struct inode_fs_paths
*ipath
= NULL
;
3387 struct btrfs_path
*path
;
3389 if (!capable(CAP_DAC_READ_SEARCH
))
3392 path
= btrfs_alloc_path();
3398 ipa
= memdup_user(arg
, sizeof(*ipa
));
3405 size
= min_t(u32
, ipa
->size
, 4096);
3406 ipath
= init_ipath(size
, root
, path
);
3407 if (IS_ERR(ipath
)) {
3408 ret
= PTR_ERR(ipath
);
3413 ret
= paths_from_inode(ipa
->inum
, ipath
);
3417 for (i
= 0; i
< ipath
->fspath
->elem_cnt
; ++i
) {
3418 rel_ptr
= ipath
->fspath
->val
[i
] -
3419 (u64
)(unsigned long)ipath
->fspath
->val
;
3420 ipath
->fspath
->val
[i
] = rel_ptr
;
3423 btrfs_free_path(path
);
3425 ret
= copy_to_user((void __user
*)(unsigned long)ipa
->fspath
,
3426 ipath
->fspath
, size
);
3433 btrfs_free_path(path
);
3440 static long btrfs_ioctl_logical_to_ino(struct btrfs_fs_info
*fs_info
,
3441 void __user
*arg
, int version
)
3445 struct btrfs_ioctl_logical_ino_args
*loi
;
3446 struct btrfs_data_container
*inodes
= NULL
;
3447 struct btrfs_path
*path
= NULL
;
3450 if (!capable(CAP_SYS_ADMIN
))
3453 loi
= memdup_user(arg
, sizeof(*loi
));
3455 return PTR_ERR(loi
);
3458 ignore_offset
= false;
3459 size
= min_t(u32
, loi
->size
, SZ_64K
);
3461 /* All reserved bits must be 0 for now */
3462 if (memchr_inv(loi
->reserved
, 0, sizeof(loi
->reserved
))) {
3466 /* Only accept flags we have defined so far */
3467 if (loi
->flags
& ~(BTRFS_LOGICAL_INO_ARGS_IGNORE_OFFSET
)) {
3471 ignore_offset
= loi
->flags
& BTRFS_LOGICAL_INO_ARGS_IGNORE_OFFSET
;
3472 size
= min_t(u32
, loi
->size
, SZ_16M
);
3475 inodes
= init_data_container(size
);
3476 if (IS_ERR(inodes
)) {
3477 ret
= PTR_ERR(inodes
);
3481 path
= btrfs_alloc_path();
3486 ret
= iterate_inodes_from_logical(loi
->logical
, fs_info
, path
,
3487 inodes
, ignore_offset
);
3488 btrfs_free_path(path
);
3494 ret
= copy_to_user((void __user
*)(unsigned long)loi
->inodes
, inodes
,
3507 void btrfs_update_ioctl_balance_args(struct btrfs_fs_info
*fs_info
,
3508 struct btrfs_ioctl_balance_args
*bargs
)
3510 struct btrfs_balance_control
*bctl
= fs_info
->balance_ctl
;
3512 bargs
->flags
= bctl
->flags
;
3514 if (test_bit(BTRFS_FS_BALANCE_RUNNING
, &fs_info
->flags
))
3515 bargs
->state
|= BTRFS_BALANCE_STATE_RUNNING
;
3516 if (atomic_read(&fs_info
->balance_pause_req
))
3517 bargs
->state
|= BTRFS_BALANCE_STATE_PAUSE_REQ
;
3518 if (atomic_read(&fs_info
->balance_cancel_req
))
3519 bargs
->state
|= BTRFS_BALANCE_STATE_CANCEL_REQ
;
3521 memcpy(&bargs
->data
, &bctl
->data
, sizeof(bargs
->data
));
3522 memcpy(&bargs
->meta
, &bctl
->meta
, sizeof(bargs
->meta
));
3523 memcpy(&bargs
->sys
, &bctl
->sys
, sizeof(bargs
->sys
));
3525 spin_lock(&fs_info
->balance_lock
);
3526 memcpy(&bargs
->stat
, &bctl
->stat
, sizeof(bargs
->stat
));
3527 spin_unlock(&fs_info
->balance_lock
);
3531 * Try to acquire fs_info::balance_mutex as well as set BTRFS_EXLCOP_BALANCE as
3534 * @fs_info: the filesystem
3535 * @excl_acquired: ptr to boolean value which is set to false in case balance
3538 * Return 0 on success in which case both fs_info::balance is acquired as well
3539 * as exclusive ops are blocked. In case of failure return an error code.
3541 static int btrfs_try_lock_balance(struct btrfs_fs_info
*fs_info
, bool *excl_acquired
)
3546 * Exclusive operation is locked. Three possibilities:
3547 * (1) some other op is running
3548 * (2) balance is running
3549 * (3) balance is paused -- special case (think resume)
3552 if (btrfs_exclop_start(fs_info
, BTRFS_EXCLOP_BALANCE
)) {
3553 *excl_acquired
= true;
3554 mutex_lock(&fs_info
->balance_mutex
);
3558 mutex_lock(&fs_info
->balance_mutex
);
3559 if (fs_info
->balance_ctl
) {
3560 /* This is either (2) or (3) */
3561 if (test_bit(BTRFS_FS_BALANCE_RUNNING
, &fs_info
->flags
)) {
3567 mutex_unlock(&fs_info
->balance_mutex
);
3569 * Lock released to allow other waiters to
3570 * continue, we'll reexamine the status again.
3572 mutex_lock(&fs_info
->balance_mutex
);
3574 if (fs_info
->balance_ctl
&&
3575 !test_bit(BTRFS_FS_BALANCE_RUNNING
, &fs_info
->flags
)) {
3577 *excl_acquired
= false;
3583 ret
= BTRFS_ERROR_DEV_EXCL_RUN_IN_PROGRESS
;
3587 mutex_unlock(&fs_info
->balance_mutex
);
3591 mutex_unlock(&fs_info
->balance_mutex
);
3592 *excl_acquired
= false;
3596 static long btrfs_ioctl_balance(struct file
*file
, void __user
*arg
)
3598 struct btrfs_root
*root
= BTRFS_I(file_inode(file
))->root
;
3599 struct btrfs_fs_info
*fs_info
= root
->fs_info
;
3600 struct btrfs_ioctl_balance_args
*bargs
;
3601 struct btrfs_balance_control
*bctl
;
3602 bool need_unlock
= true;
3605 if (!capable(CAP_SYS_ADMIN
))
3608 ret
= mnt_want_write_file(file
);
3612 bargs
= memdup_user(arg
, sizeof(*bargs
));
3613 if (IS_ERR(bargs
)) {
3614 ret
= PTR_ERR(bargs
);
3619 ret
= btrfs_try_lock_balance(fs_info
, &need_unlock
);
3623 lockdep_assert_held(&fs_info
->balance_mutex
);
3625 if (bargs
->flags
& BTRFS_BALANCE_RESUME
) {
3626 if (!fs_info
->balance_ctl
) {
3631 bctl
= fs_info
->balance_ctl
;
3632 spin_lock(&fs_info
->balance_lock
);
3633 bctl
->flags
|= BTRFS_BALANCE_RESUME
;
3634 spin_unlock(&fs_info
->balance_lock
);
3635 btrfs_exclop_balance(fs_info
, BTRFS_EXCLOP_BALANCE
);
3640 if (bargs
->flags
& ~(BTRFS_BALANCE_ARGS_MASK
| BTRFS_BALANCE_TYPE_MASK
)) {
3645 if (fs_info
->balance_ctl
) {
3650 bctl
= kzalloc(sizeof(*bctl
), GFP_KERNEL
);
3656 memcpy(&bctl
->data
, &bargs
->data
, sizeof(bctl
->data
));
3657 memcpy(&bctl
->meta
, &bargs
->meta
, sizeof(bctl
->meta
));
3658 memcpy(&bctl
->sys
, &bargs
->sys
, sizeof(bctl
->sys
));
3660 bctl
->flags
= bargs
->flags
;
3663 * Ownership of bctl and exclusive operation goes to btrfs_balance.
3664 * bctl is freed in reset_balance_state, or, if restriper was paused
3665 * all the way until unmount, in free_fs_info. The flag should be
3666 * cleared after reset_balance_state.
3668 need_unlock
= false;
3670 ret
= btrfs_balance(fs_info
, bctl
, bargs
);
3673 if (ret
== 0 || ret
== -ECANCELED
) {
3674 if (copy_to_user(arg
, bargs
, sizeof(*bargs
)))
3680 mutex_unlock(&fs_info
->balance_mutex
);
3682 btrfs_exclop_finish(fs_info
);
3684 mnt_drop_write_file(file
);
3689 static long btrfs_ioctl_balance_ctl(struct btrfs_fs_info
*fs_info
, int cmd
)
3691 if (!capable(CAP_SYS_ADMIN
))
3695 case BTRFS_BALANCE_CTL_PAUSE
:
3696 return btrfs_pause_balance(fs_info
);
3697 case BTRFS_BALANCE_CTL_CANCEL
:
3698 return btrfs_cancel_balance(fs_info
);
3704 static long btrfs_ioctl_balance_progress(struct btrfs_fs_info
*fs_info
,
3707 struct btrfs_ioctl_balance_args
*bargs
;
3710 if (!capable(CAP_SYS_ADMIN
))
3713 mutex_lock(&fs_info
->balance_mutex
);
3714 if (!fs_info
->balance_ctl
) {
3719 bargs
= kzalloc(sizeof(*bargs
), GFP_KERNEL
);
3725 btrfs_update_ioctl_balance_args(fs_info
, bargs
);
3727 if (copy_to_user(arg
, bargs
, sizeof(*bargs
)))
3732 mutex_unlock(&fs_info
->balance_mutex
);
3736 static long btrfs_ioctl_quota_ctl(struct file
*file
, void __user
*arg
)
3738 struct inode
*inode
= file_inode(file
);
3739 struct btrfs_fs_info
*fs_info
= inode_to_fs_info(inode
);
3740 struct btrfs_ioctl_quota_ctl_args
*sa
;
3743 if (!capable(CAP_SYS_ADMIN
))
3746 ret
= mnt_want_write_file(file
);
3750 sa
= memdup_user(arg
, sizeof(*sa
));
3757 case BTRFS_QUOTA_CTL_ENABLE
:
3758 case BTRFS_QUOTA_CTL_ENABLE_SIMPLE_QUOTA
:
3759 down_write(&fs_info
->subvol_sem
);
3760 ret
= btrfs_quota_enable(fs_info
, sa
);
3761 up_write(&fs_info
->subvol_sem
);
3763 case BTRFS_QUOTA_CTL_DISABLE
:
3765 * Lock the cleaner mutex to prevent races with concurrent
3766 * relocation, because relocation may be building backrefs for
3767 * blocks of the quota root while we are deleting the root. This
3768 * is like dropping fs roots of deleted snapshots/subvolumes, we
3769 * need the same protection.
3771 * This also prevents races between concurrent tasks trying to
3772 * disable quotas, because we will unlock and relock
3773 * qgroup_ioctl_lock across BTRFS_FS_QUOTA_ENABLED changes.
3775 * We take this here because we have the dependency of
3777 * inode_lock -> subvol_sem
3779 * because of rename. With relocation we can prealloc extents,
3780 * so that makes the dependency chain
3782 * cleaner_mutex -> inode_lock -> subvol_sem
3784 * so we must take the cleaner_mutex here before we take the
3785 * subvol_sem. The deadlock can't actually happen, but this
3788 mutex_lock(&fs_info
->cleaner_mutex
);
3789 down_write(&fs_info
->subvol_sem
);
3790 ret
= btrfs_quota_disable(fs_info
);
3791 up_write(&fs_info
->subvol_sem
);
3792 mutex_unlock(&fs_info
->cleaner_mutex
);
3801 mnt_drop_write_file(file
);
3806 * Quick check for ioctl handlers if quotas are enabled. Proper locking must be
3807 * done before any operations.
3809 static bool qgroup_enabled(struct btrfs_fs_info
*fs_info
)
3813 mutex_lock(&fs_info
->qgroup_ioctl_lock
);
3814 if (!fs_info
->quota_root
)
3816 mutex_unlock(&fs_info
->qgroup_ioctl_lock
);
3821 static long btrfs_ioctl_qgroup_assign(struct file
*file
, void __user
*arg
)
3823 struct inode
*inode
= file_inode(file
);
3824 struct btrfs_fs_info
*fs_info
= inode_to_fs_info(inode
);
3825 struct btrfs_root
*root
= BTRFS_I(inode
)->root
;
3826 struct btrfs_ioctl_qgroup_assign_args
*sa
;
3827 struct btrfs_qgroup_list
*prealloc
= NULL
;
3828 struct btrfs_trans_handle
*trans
;
3832 if (!capable(CAP_SYS_ADMIN
))
3835 if (!qgroup_enabled(root
->fs_info
))
3838 ret
= mnt_want_write_file(file
);
3842 sa
= memdup_user(arg
, sizeof(*sa
));
3849 prealloc
= kzalloc(sizeof(*prealloc
), GFP_KERNEL
);
3856 trans
= btrfs_join_transaction(root
);
3857 if (IS_ERR(trans
)) {
3858 ret
= PTR_ERR(trans
);
3863 * Prealloc ownership is moved to the relation handler, there it's used
3864 * or freed on error.
3867 ret
= btrfs_add_qgroup_relation(trans
, sa
->src
, sa
->dst
, prealloc
);
3870 ret
= btrfs_del_qgroup_relation(trans
, sa
->src
, sa
->dst
);
3873 /* update qgroup status and info */
3874 mutex_lock(&fs_info
->qgroup_ioctl_lock
);
3875 err
= btrfs_run_qgroups(trans
);
3876 mutex_unlock(&fs_info
->qgroup_ioctl_lock
);
3879 "qgroup status update failed after %s relation, marked as inconsistent",
3880 sa
->assign
? "adding" : "deleting");
3881 err
= btrfs_end_transaction(trans
);
3889 mnt_drop_write_file(file
);
3893 static long btrfs_ioctl_qgroup_create(struct file
*file
, void __user
*arg
)
3895 struct inode
*inode
= file_inode(file
);
3896 struct btrfs_root
*root
= BTRFS_I(inode
)->root
;
3897 struct btrfs_ioctl_qgroup_create_args
*sa
;
3898 struct btrfs_trans_handle
*trans
;
3902 if (!capable(CAP_SYS_ADMIN
))
3905 if (!qgroup_enabled(root
->fs_info
))
3908 ret
= mnt_want_write_file(file
);
3912 sa
= memdup_user(arg
, sizeof(*sa
));
3918 if (!sa
->qgroupid
) {
3923 if (sa
->create
&& is_fstree(sa
->qgroupid
)) {
3928 trans
= btrfs_join_transaction(root
);
3929 if (IS_ERR(trans
)) {
3930 ret
= PTR_ERR(trans
);
3935 ret
= btrfs_create_qgroup(trans
, sa
->qgroupid
);
3937 ret
= btrfs_remove_qgroup(trans
, sa
->qgroupid
);
3940 err
= btrfs_end_transaction(trans
);
3947 mnt_drop_write_file(file
);
3951 static long btrfs_ioctl_qgroup_limit(struct file
*file
, void __user
*arg
)
3953 struct inode
*inode
= file_inode(file
);
3954 struct btrfs_root
*root
= BTRFS_I(inode
)->root
;
3955 struct btrfs_ioctl_qgroup_limit_args
*sa
;
3956 struct btrfs_trans_handle
*trans
;
3961 if (!capable(CAP_SYS_ADMIN
))
3964 if (!qgroup_enabled(root
->fs_info
))
3967 ret
= mnt_want_write_file(file
);
3971 sa
= memdup_user(arg
, sizeof(*sa
));
3977 trans
= btrfs_join_transaction(root
);
3978 if (IS_ERR(trans
)) {
3979 ret
= PTR_ERR(trans
);
3983 qgroupid
= sa
->qgroupid
;
3985 /* take the current subvol as qgroup */
3986 qgroupid
= btrfs_root_id(root
);
3989 ret
= btrfs_limit_qgroup(trans
, qgroupid
, &sa
->lim
);
3991 err
= btrfs_end_transaction(trans
);
3998 mnt_drop_write_file(file
);
4002 static long btrfs_ioctl_quota_rescan(struct file
*file
, void __user
*arg
)
4004 struct inode
*inode
= file_inode(file
);
4005 struct btrfs_fs_info
*fs_info
= inode_to_fs_info(inode
);
4006 struct btrfs_ioctl_quota_rescan_args
*qsa
;
4009 if (!capable(CAP_SYS_ADMIN
))
4012 if (!qgroup_enabled(fs_info
))
4015 ret
= mnt_want_write_file(file
);
4019 qsa
= memdup_user(arg
, sizeof(*qsa
));
4030 ret
= btrfs_qgroup_rescan(fs_info
);
4035 mnt_drop_write_file(file
);
4039 static long btrfs_ioctl_quota_rescan_status(struct btrfs_fs_info
*fs_info
,
4042 struct btrfs_ioctl_quota_rescan_args qsa
= {0};
4044 if (!capable(CAP_SYS_ADMIN
))
4047 if (fs_info
->qgroup_flags
& BTRFS_QGROUP_STATUS_FLAG_RESCAN
) {
4049 qsa
.progress
= fs_info
->qgroup_rescan_progress
.objectid
;
4052 if (copy_to_user(arg
, &qsa
, sizeof(qsa
)))
4058 static long btrfs_ioctl_quota_rescan_wait(struct btrfs_fs_info
*fs_info
)
4060 if (!capable(CAP_SYS_ADMIN
))
4063 return btrfs_qgroup_wait_for_completion(fs_info
, true);
4066 static long _btrfs_ioctl_set_received_subvol(struct file
*file
,
4067 struct mnt_idmap
*idmap
,
4068 struct btrfs_ioctl_received_subvol_args
*sa
)
4070 struct inode
*inode
= file_inode(file
);
4071 struct btrfs_fs_info
*fs_info
= inode_to_fs_info(inode
);
4072 struct btrfs_root
*root
= BTRFS_I(inode
)->root
;
4073 struct btrfs_root_item
*root_item
= &root
->root_item
;
4074 struct btrfs_trans_handle
*trans
;
4075 struct timespec64 ct
= current_time(inode
);
4077 int received_uuid_changed
;
4079 if (!inode_owner_or_capable(idmap
, inode
))
4082 ret
= mnt_want_write_file(file
);
4086 down_write(&fs_info
->subvol_sem
);
4088 if (btrfs_ino(BTRFS_I(inode
)) != BTRFS_FIRST_FREE_OBJECTID
) {
4093 if (btrfs_root_readonly(root
)) {
4100 * 2 - uuid items (received uuid + subvol uuid)
4102 trans
= btrfs_start_transaction(root
, 3);
4103 if (IS_ERR(trans
)) {
4104 ret
= PTR_ERR(trans
);
4109 sa
->rtransid
= trans
->transid
;
4110 sa
->rtime
.sec
= ct
.tv_sec
;
4111 sa
->rtime
.nsec
= ct
.tv_nsec
;
4113 received_uuid_changed
= memcmp(root_item
->received_uuid
, sa
->uuid
,
4115 if (received_uuid_changed
&&
4116 !btrfs_is_empty_uuid(root_item
->received_uuid
)) {
4117 ret
= btrfs_uuid_tree_remove(trans
, root_item
->received_uuid
,
4118 BTRFS_UUID_KEY_RECEIVED_SUBVOL
,
4119 btrfs_root_id(root
));
4120 if (ret
&& ret
!= -ENOENT
) {
4121 btrfs_abort_transaction(trans
, ret
);
4122 btrfs_end_transaction(trans
);
4126 memcpy(root_item
->received_uuid
, sa
->uuid
, BTRFS_UUID_SIZE
);
4127 btrfs_set_root_stransid(root_item
, sa
->stransid
);
4128 btrfs_set_root_rtransid(root_item
, sa
->rtransid
);
4129 btrfs_set_stack_timespec_sec(&root_item
->stime
, sa
->stime
.sec
);
4130 btrfs_set_stack_timespec_nsec(&root_item
->stime
, sa
->stime
.nsec
);
4131 btrfs_set_stack_timespec_sec(&root_item
->rtime
, sa
->rtime
.sec
);
4132 btrfs_set_stack_timespec_nsec(&root_item
->rtime
, sa
->rtime
.nsec
);
4134 ret
= btrfs_update_root(trans
, fs_info
->tree_root
,
4135 &root
->root_key
, &root
->root_item
);
4137 btrfs_end_transaction(trans
);
4140 if (received_uuid_changed
&& !btrfs_is_empty_uuid(sa
->uuid
)) {
4141 ret
= btrfs_uuid_tree_add(trans
, sa
->uuid
,
4142 BTRFS_UUID_KEY_RECEIVED_SUBVOL
,
4143 btrfs_root_id(root
));
4144 if (ret
< 0 && ret
!= -EEXIST
) {
4145 btrfs_abort_transaction(trans
, ret
);
4146 btrfs_end_transaction(trans
);
4150 ret
= btrfs_commit_transaction(trans
);
4152 up_write(&fs_info
->subvol_sem
);
4153 mnt_drop_write_file(file
);
4158 static long btrfs_ioctl_set_received_subvol_32(struct file
*file
,
4161 struct btrfs_ioctl_received_subvol_args_32
*args32
= NULL
;
4162 struct btrfs_ioctl_received_subvol_args
*args64
= NULL
;
4165 args32
= memdup_user(arg
, sizeof(*args32
));
4167 return PTR_ERR(args32
);
4169 args64
= kmalloc(sizeof(*args64
), GFP_KERNEL
);
4175 memcpy(args64
->uuid
, args32
->uuid
, BTRFS_UUID_SIZE
);
4176 args64
->stransid
= args32
->stransid
;
4177 args64
->rtransid
= args32
->rtransid
;
4178 args64
->stime
.sec
= args32
->stime
.sec
;
4179 args64
->stime
.nsec
= args32
->stime
.nsec
;
4180 args64
->rtime
.sec
= args32
->rtime
.sec
;
4181 args64
->rtime
.nsec
= args32
->rtime
.nsec
;
4182 args64
->flags
= args32
->flags
;
4184 ret
= _btrfs_ioctl_set_received_subvol(file
, file_mnt_idmap(file
), args64
);
4188 memcpy(args32
->uuid
, args64
->uuid
, BTRFS_UUID_SIZE
);
4189 args32
->stransid
= args64
->stransid
;
4190 args32
->rtransid
= args64
->rtransid
;
4191 args32
->stime
.sec
= args64
->stime
.sec
;
4192 args32
->stime
.nsec
= args64
->stime
.nsec
;
4193 args32
->rtime
.sec
= args64
->rtime
.sec
;
4194 args32
->rtime
.nsec
= args64
->rtime
.nsec
;
4195 args32
->flags
= args64
->flags
;
4197 ret
= copy_to_user(arg
, args32
, sizeof(*args32
));
4208 static long btrfs_ioctl_set_received_subvol(struct file
*file
,
4211 struct btrfs_ioctl_received_subvol_args
*sa
= NULL
;
4214 sa
= memdup_user(arg
, sizeof(*sa
));
4218 ret
= _btrfs_ioctl_set_received_subvol(file
, file_mnt_idmap(file
), sa
);
4223 ret
= copy_to_user(arg
, sa
, sizeof(*sa
));
4232 static int btrfs_ioctl_get_fslabel(struct btrfs_fs_info
*fs_info
,
4237 char label
[BTRFS_LABEL_SIZE
];
4239 spin_lock(&fs_info
->super_lock
);
4240 memcpy(label
, fs_info
->super_copy
->label
, BTRFS_LABEL_SIZE
);
4241 spin_unlock(&fs_info
->super_lock
);
4243 len
= strnlen(label
, BTRFS_LABEL_SIZE
);
4245 if (len
== BTRFS_LABEL_SIZE
) {
4247 "label is too long, return the first %zu bytes",
4251 ret
= copy_to_user(arg
, label
, len
);
4253 return ret
? -EFAULT
: 0;
4256 static int btrfs_ioctl_set_fslabel(struct file
*file
, void __user
*arg
)
4258 struct inode
*inode
= file_inode(file
);
4259 struct btrfs_fs_info
*fs_info
= inode_to_fs_info(inode
);
4260 struct btrfs_root
*root
= BTRFS_I(inode
)->root
;
4261 struct btrfs_super_block
*super_block
= fs_info
->super_copy
;
4262 struct btrfs_trans_handle
*trans
;
4263 char label
[BTRFS_LABEL_SIZE
];
4266 if (!capable(CAP_SYS_ADMIN
))
4269 if (copy_from_user(label
, arg
, sizeof(label
)))
4272 if (strnlen(label
, BTRFS_LABEL_SIZE
) == BTRFS_LABEL_SIZE
) {
4274 "unable to set label with more than %d bytes",
4275 BTRFS_LABEL_SIZE
- 1);
4279 ret
= mnt_want_write_file(file
);
4283 trans
= btrfs_start_transaction(root
, 0);
4284 if (IS_ERR(trans
)) {
4285 ret
= PTR_ERR(trans
);
4289 spin_lock(&fs_info
->super_lock
);
4290 strcpy(super_block
->label
, label
);
4291 spin_unlock(&fs_info
->super_lock
);
4292 ret
= btrfs_commit_transaction(trans
);
4295 mnt_drop_write_file(file
);
4299 #define INIT_FEATURE_FLAGS(suffix) \
4300 { .compat_flags = BTRFS_FEATURE_COMPAT_##suffix, \
4301 .compat_ro_flags = BTRFS_FEATURE_COMPAT_RO_##suffix, \
4302 .incompat_flags = BTRFS_FEATURE_INCOMPAT_##suffix }
4304 int btrfs_ioctl_get_supported_features(void __user
*arg
)
4306 static const struct btrfs_ioctl_feature_flags features
[3] = {
4307 INIT_FEATURE_FLAGS(SUPP
),
4308 INIT_FEATURE_FLAGS(SAFE_SET
),
4309 INIT_FEATURE_FLAGS(SAFE_CLEAR
)
4312 if (copy_to_user(arg
, &features
, sizeof(features
)))
4318 static int btrfs_ioctl_get_features(struct btrfs_fs_info
*fs_info
,
4321 struct btrfs_super_block
*super_block
= fs_info
->super_copy
;
4322 struct btrfs_ioctl_feature_flags features
;
4324 features
.compat_flags
= btrfs_super_compat_flags(super_block
);
4325 features
.compat_ro_flags
= btrfs_super_compat_ro_flags(super_block
);
4326 features
.incompat_flags
= btrfs_super_incompat_flags(super_block
);
4328 if (copy_to_user(arg
, &features
, sizeof(features
)))
4334 static int check_feature_bits(struct btrfs_fs_info
*fs_info
,
4335 enum btrfs_feature_set set
,
4336 u64 change_mask
, u64 flags
, u64 supported_flags
,
4337 u64 safe_set
, u64 safe_clear
)
4339 const char *type
= btrfs_feature_set_name(set
);
4341 u64 disallowed
, unsupported
;
4342 u64 set_mask
= flags
& change_mask
;
4343 u64 clear_mask
= ~flags
& change_mask
;
4345 unsupported
= set_mask
& ~supported_flags
;
4347 names
= btrfs_printable_features(set
, unsupported
);
4350 "this kernel does not support the %s feature bit%s",
4351 names
, strchr(names
, ',') ? "s" : "");
4355 "this kernel does not support %s bits 0x%llx",
4360 disallowed
= set_mask
& ~safe_set
;
4362 names
= btrfs_printable_features(set
, disallowed
);
4365 "can't set the %s feature bit%s while mounted",
4366 names
, strchr(names
, ',') ? "s" : "");
4370 "can't set %s bits 0x%llx while mounted",
4375 disallowed
= clear_mask
& ~safe_clear
;
4377 names
= btrfs_printable_features(set
, disallowed
);
4380 "can't clear the %s feature bit%s while mounted",
4381 names
, strchr(names
, ',') ? "s" : "");
4385 "can't clear %s bits 0x%llx while mounted",
4393 #define check_feature(fs_info, change_mask, flags, mask_base) \
4394 check_feature_bits(fs_info, FEAT_##mask_base, change_mask, flags, \
4395 BTRFS_FEATURE_ ## mask_base ## _SUPP, \
4396 BTRFS_FEATURE_ ## mask_base ## _SAFE_SET, \
4397 BTRFS_FEATURE_ ## mask_base ## _SAFE_CLEAR)
4399 static int btrfs_ioctl_set_features(struct file
*file
, void __user
*arg
)
4401 struct inode
*inode
= file_inode(file
);
4402 struct btrfs_fs_info
*fs_info
= inode_to_fs_info(inode
);
4403 struct btrfs_root
*root
= BTRFS_I(inode
)->root
;
4404 struct btrfs_super_block
*super_block
= fs_info
->super_copy
;
4405 struct btrfs_ioctl_feature_flags flags
[2];
4406 struct btrfs_trans_handle
*trans
;
4410 if (!capable(CAP_SYS_ADMIN
))
4413 if (copy_from_user(flags
, arg
, sizeof(flags
)))
4417 if (!flags
[0].compat_flags
&& !flags
[0].compat_ro_flags
&&
4418 !flags
[0].incompat_flags
)
4421 ret
= check_feature(fs_info
, flags
[0].compat_flags
,
4422 flags
[1].compat_flags
, COMPAT
);
4426 ret
= check_feature(fs_info
, flags
[0].compat_ro_flags
,
4427 flags
[1].compat_ro_flags
, COMPAT_RO
);
4431 ret
= check_feature(fs_info
, flags
[0].incompat_flags
,
4432 flags
[1].incompat_flags
, INCOMPAT
);
4436 ret
= mnt_want_write_file(file
);
4440 trans
= btrfs_start_transaction(root
, 0);
4441 if (IS_ERR(trans
)) {
4442 ret
= PTR_ERR(trans
);
4443 goto out_drop_write
;
4446 spin_lock(&fs_info
->super_lock
);
4447 newflags
= btrfs_super_compat_flags(super_block
);
4448 newflags
|= flags
[0].compat_flags
& flags
[1].compat_flags
;
4449 newflags
&= ~(flags
[0].compat_flags
& ~flags
[1].compat_flags
);
4450 btrfs_set_super_compat_flags(super_block
, newflags
);
4452 newflags
= btrfs_super_compat_ro_flags(super_block
);
4453 newflags
|= flags
[0].compat_ro_flags
& flags
[1].compat_ro_flags
;
4454 newflags
&= ~(flags
[0].compat_ro_flags
& ~flags
[1].compat_ro_flags
);
4455 btrfs_set_super_compat_ro_flags(super_block
, newflags
);
4457 newflags
= btrfs_super_incompat_flags(super_block
);
4458 newflags
|= flags
[0].incompat_flags
& flags
[1].incompat_flags
;
4459 newflags
&= ~(flags
[0].incompat_flags
& ~flags
[1].incompat_flags
);
4460 btrfs_set_super_incompat_flags(super_block
, newflags
);
4461 spin_unlock(&fs_info
->super_lock
);
4463 ret
= btrfs_commit_transaction(trans
);
4465 mnt_drop_write_file(file
);
4470 static int _btrfs_ioctl_send(struct btrfs_inode
*inode
, void __user
*argp
, bool compat
)
4472 struct btrfs_ioctl_send_args
*arg
;
4476 #if defined(CONFIG_64BIT) && defined(CONFIG_COMPAT)
4477 struct btrfs_ioctl_send_args_32 args32
= { 0 };
4479 ret
= copy_from_user(&args32
, argp
, sizeof(args32
));
4482 arg
= kzalloc(sizeof(*arg
), GFP_KERNEL
);
4485 arg
->send_fd
= args32
.send_fd
;
4486 arg
->clone_sources_count
= args32
.clone_sources_count
;
4487 arg
->clone_sources
= compat_ptr(args32
.clone_sources
);
4488 arg
->parent_root
= args32
.parent_root
;
4489 arg
->flags
= args32
.flags
;
4490 arg
->version
= args32
.version
;
4491 memcpy(arg
->reserved
, args32
.reserved
,
4492 sizeof(args32
.reserved
));
4497 arg
= memdup_user(argp
, sizeof(*arg
));
4499 return PTR_ERR(arg
);
4501 ret
= btrfs_ioctl_send(inode
, arg
);
4506 static int btrfs_ioctl_encoded_read(struct file
*file
, void __user
*argp
,
4509 struct btrfs_ioctl_encoded_io_args args
= { 0 };
4510 size_t copy_end_kernel
= offsetofend(struct btrfs_ioctl_encoded_io_args
,
4513 struct btrfs_inode
*inode
= BTRFS_I(file_inode(file
));
4514 struct btrfs_fs_info
*fs_info
= inode
->root
->fs_info
;
4515 struct extent_io_tree
*io_tree
= &inode
->io_tree
;
4516 struct iovec iovstack
[UIO_FASTIOV
];
4517 struct iovec
*iov
= iovstack
;
4518 struct iov_iter iter
;
4522 u64 disk_bytenr
, disk_io_size
;
4523 struct extent_state
*cached_state
= NULL
;
4525 if (!capable(CAP_SYS_ADMIN
)) {
4531 #if defined(CONFIG_64BIT) && defined(CONFIG_COMPAT)
4532 struct btrfs_ioctl_encoded_io_args_32 args32
;
4534 copy_end
= offsetofend(struct btrfs_ioctl_encoded_io_args_32
,
4536 if (copy_from_user(&args32
, argp
, copy_end
)) {
4540 args
.iov
= compat_ptr(args32
.iov
);
4541 args
.iovcnt
= args32
.iovcnt
;
4542 args
.offset
= args32
.offset
;
4543 args
.flags
= args32
.flags
;
4548 copy_end
= copy_end_kernel
;
4549 if (copy_from_user(&args
, argp
, copy_end
)) {
4554 if (args
.flags
!= 0) {
4559 ret
= import_iovec(ITER_DEST
, args
.iov
, args
.iovcnt
, ARRAY_SIZE(iovstack
),
4564 if (iov_iter_count(&iter
) == 0) {
4569 ret
= rw_verify_area(READ
, file
, &pos
, args
.len
);
4573 init_sync_kiocb(&kiocb
, file
);
4576 ret
= btrfs_encoded_read(&kiocb
, &iter
, &args
, &cached_state
,
4577 &disk_bytenr
, &disk_io_size
);
4579 if (ret
== -EIOCBQUEUED
) {
4580 bool unlocked
= false;
4581 u64 start
, lockend
, count
;
4583 start
= ALIGN_DOWN(kiocb
.ki_pos
, fs_info
->sectorsize
);
4584 lockend
= start
+ BTRFS_MAX_UNCOMPRESSED
- 1;
4586 if (args
.compression
)
4587 count
= disk_io_size
;
4591 ret
= btrfs_encoded_read_regular(&kiocb
, &iter
, start
, lockend
,
4592 &cached_state
, disk_bytenr
,
4593 disk_io_size
, count
,
4594 args
.compression
, &unlocked
);
4597 unlock_extent(io_tree
, start
, lockend
, &cached_state
);
4598 btrfs_inode_unlock(inode
, BTRFS_ILOCK_SHARED
);
4603 fsnotify_access(file
);
4604 if (copy_to_user(argp
+ copy_end
,
4605 (char *)&args
+ copy_end_kernel
,
4606 sizeof(args
) - copy_end_kernel
))
4614 add_rchar(current
, ret
);
4619 static int btrfs_ioctl_encoded_write(struct file
*file
, void __user
*argp
, bool compat
)
4621 struct btrfs_ioctl_encoded_io_args args
;
4622 struct iovec iovstack
[UIO_FASTIOV
];
4623 struct iovec
*iov
= iovstack
;
4624 struct iov_iter iter
;
4629 if (!capable(CAP_SYS_ADMIN
)) {
4634 if (!(file
->f_mode
& FMODE_WRITE
)) {
4640 #if defined(CONFIG_64BIT) && defined(CONFIG_COMPAT)
4641 struct btrfs_ioctl_encoded_io_args_32 args32
;
4643 if (copy_from_user(&args32
, argp
, sizeof(args32
))) {
4647 args
.iov
= compat_ptr(args32
.iov
);
4648 args
.iovcnt
= args32
.iovcnt
;
4649 args
.offset
= args32
.offset
;
4650 args
.flags
= args32
.flags
;
4651 args
.len
= args32
.len
;
4652 args
.unencoded_len
= args32
.unencoded_len
;
4653 args
.unencoded_offset
= args32
.unencoded_offset
;
4654 args
.compression
= args32
.compression
;
4655 args
.encryption
= args32
.encryption
;
4656 memcpy(args
.reserved
, args32
.reserved
, sizeof(args
.reserved
));
4661 if (copy_from_user(&args
, argp
, sizeof(args
))) {
4668 if (args
.flags
!= 0)
4670 if (memchr_inv(args
.reserved
, 0, sizeof(args
.reserved
)))
4672 if (args
.compression
== BTRFS_ENCODED_IO_COMPRESSION_NONE
&&
4673 args
.encryption
== BTRFS_ENCODED_IO_ENCRYPTION_NONE
)
4675 if (args
.compression
>= BTRFS_ENCODED_IO_COMPRESSION_TYPES
||
4676 args
.encryption
>= BTRFS_ENCODED_IO_ENCRYPTION_TYPES
)
4678 if (args
.unencoded_offset
> args
.unencoded_len
)
4680 if (args
.len
> args
.unencoded_len
- args
.unencoded_offset
)
4683 ret
= import_iovec(ITER_SOURCE
, args
.iov
, args
.iovcnt
, ARRAY_SIZE(iovstack
),
4688 if (iov_iter_count(&iter
) == 0) {
4693 ret
= rw_verify_area(WRITE
, file
, &pos
, args
.len
);
4697 init_sync_kiocb(&kiocb
, file
);
4698 ret
= kiocb_set_rw_flags(&kiocb
, 0, WRITE
);
4703 file_start_write(file
);
4705 ret
= btrfs_do_write_iter(&kiocb
, &iter
, &args
);
4707 fsnotify_modify(file
);
4709 file_end_write(file
);
4714 add_wchar(current
, ret
);
4720 * Context that's attached to an encoded read io_uring command, in cmd->pdu. It
4721 * contains the fields in btrfs_uring_read_extent that are necessary to finish
4722 * off and cleanup the I/O in btrfs_uring_read_finished.
4724 struct btrfs_uring_priv
{
4725 struct io_uring_cmd
*cmd
;
4726 struct page
**pages
;
4727 unsigned long nr_pages
;
4730 struct iov_iter iter
;
4731 struct extent_state
*cached_state
;
4739 struct io_btrfs_cmd
{
4740 struct btrfs_uring_priv
*priv
;
4743 static void btrfs_uring_read_finished(struct io_uring_cmd
*cmd
, unsigned int issue_flags
)
4745 struct io_btrfs_cmd
*bc
= io_uring_cmd_to_pdu(cmd
, struct io_btrfs_cmd
);
4746 struct btrfs_uring_priv
*priv
= bc
->priv
;
4747 struct btrfs_inode
*inode
= BTRFS_I(file_inode(priv
->iocb
.ki_filp
));
4748 struct extent_io_tree
*io_tree
= &inode
->io_tree
;
4749 unsigned long index
;
4754 /* The inode lock has already been acquired in btrfs_uring_read_extent. */
4755 btrfs_lockdep_inode_acquire(inode
, i_rwsem
);
4762 if (priv
->compressed
) {
4766 index
= (priv
->iocb
.ki_pos
- priv
->start
) >> PAGE_SHIFT
;
4767 page_offset
= offset_in_page(priv
->iocb
.ki_pos
- priv
->start
);
4770 while (cur
< priv
->count
) {
4771 size_t bytes
= min_t(size_t, priv
->count
- cur
, PAGE_SIZE
- page_offset
);
4773 if (copy_page_to_iter(priv
->pages
[index
], page_offset
, bytes
,
4774 &priv
->iter
) != bytes
) {
4786 unlock_extent(io_tree
, priv
->start
, priv
->lockend
, &priv
->cached_state
);
4787 btrfs_inode_unlock(inode
, BTRFS_ILOCK_SHARED
);
4789 io_uring_cmd_done(cmd
, ret
, 0, issue_flags
);
4790 add_rchar(current
, ret
);
4792 for (index
= 0; index
< priv
->nr_pages
; index
++)
4793 __free_page(priv
->pages
[index
]);
4800 void btrfs_uring_read_extent_endio(void *ctx
, int err
)
4802 struct btrfs_uring_priv
*priv
= ctx
;
4803 struct io_btrfs_cmd
*bc
= io_uring_cmd_to_pdu(priv
->cmd
, struct io_btrfs_cmd
);
4808 io_uring_cmd_complete_in_task(priv
->cmd
, btrfs_uring_read_finished
);
4811 static int btrfs_uring_read_extent(struct kiocb
*iocb
, struct iov_iter
*iter
,
4812 u64 start
, u64 lockend
,
4813 struct extent_state
*cached_state
,
4814 u64 disk_bytenr
, u64 disk_io_size
,
4815 size_t count
, bool compressed
,
4816 struct iovec
*iov
, struct io_uring_cmd
*cmd
)
4818 struct btrfs_inode
*inode
= BTRFS_I(file_inode(iocb
->ki_filp
));
4819 struct extent_io_tree
*io_tree
= &inode
->io_tree
;
4820 struct page
**pages
;
4821 struct btrfs_uring_priv
*priv
= NULL
;
4822 unsigned long nr_pages
;
4825 nr_pages
= DIV_ROUND_UP(disk_io_size
, PAGE_SIZE
);
4826 pages
= kcalloc(nr_pages
, sizeof(struct page
*), GFP_NOFS
);
4829 ret
= btrfs_alloc_page_array(nr_pages
, pages
, 0);
4835 priv
= kmalloc(sizeof(*priv
), GFP_NOFS
);
4844 priv
->count
= count
;
4846 priv
->cached_state
= cached_state
;
4847 priv
->compressed
= compressed
;
4848 priv
->nr_pages
= nr_pages
;
4849 priv
->pages
= pages
;
4850 priv
->start
= start
;
4851 priv
->lockend
= lockend
;
4854 ret
= btrfs_encoded_read_regular_fill_pages(inode
, disk_bytenr
,
4855 disk_io_size
, pages
, priv
);
4856 if (ret
&& ret
!= -EIOCBQUEUED
)
4860 * If we return -EIOCBQUEUED, we're deferring the cleanup to
4861 * btrfs_uring_read_finished(), which will handle unlocking the extent
4862 * and inode and freeing the allocations.
4866 * We're returning to userspace with the inode lock held, and that's
4867 * okay - it'll get unlocked in a worker thread. Call
4868 * btrfs_lockdep_inode_release() to avoid confusing lockdep.
4870 btrfs_lockdep_inode_release(inode
, i_rwsem
);
4872 return -EIOCBQUEUED
;
4875 unlock_extent(io_tree
, start
, lockend
, &cached_state
);
4876 btrfs_inode_unlock(inode
, BTRFS_ILOCK_SHARED
);
4881 static int btrfs_uring_encoded_read(struct io_uring_cmd
*cmd
, unsigned int issue_flags
)
4883 size_t copy_end_kernel
= offsetofend(struct btrfs_ioctl_encoded_io_args
, flags
);
4885 struct btrfs_ioctl_encoded_io_args args
= { 0 };
4887 u64 disk_bytenr
, disk_io_size
;
4889 struct btrfs_inode
*inode
;
4890 struct btrfs_fs_info
*fs_info
;
4891 struct extent_io_tree
*io_tree
;
4892 struct iovec iovstack
[UIO_FASTIOV
];
4893 struct iovec
*iov
= iovstack
;
4894 struct iov_iter iter
;
4897 struct extent_state
*cached_state
= NULL
;
4899 void __user
*sqe_addr
;
4901 if (!capable(CAP_SYS_ADMIN
)) {
4906 inode
= BTRFS_I(file
->f_inode
);
4907 fs_info
= inode
->root
->fs_info
;
4908 io_tree
= &inode
->io_tree
;
4909 sqe_addr
= u64_to_user_ptr(READ_ONCE(cmd
->sqe
->addr
));
4911 if (issue_flags
& IO_URING_F_COMPAT
) {
4912 #if defined(CONFIG_64BIT) && defined(CONFIG_COMPAT)
4913 struct btrfs_ioctl_encoded_io_args_32 args32
;
4915 copy_end
= offsetofend(struct btrfs_ioctl_encoded_io_args_32
, flags
);
4916 if (copy_from_user(&args32
, sqe_addr
, copy_end
)) {
4920 args
.iov
= compat_ptr(args32
.iov
);
4921 args
.iovcnt
= args32
.iovcnt
;
4922 args
.offset
= args32
.offset
;
4923 args
.flags
= args32
.flags
;
4928 copy_end
= copy_end_kernel
;
4929 if (copy_from_user(&args
, sqe_addr
, copy_end
)) {
4935 if (args
.flags
!= 0)
4938 ret
= import_iovec(ITER_DEST
, args
.iov
, args
.iovcnt
, ARRAY_SIZE(iovstack
),
4943 if (iov_iter_count(&iter
) == 0) {
4949 ret
= rw_verify_area(READ
, file
, &pos
, args
.len
);
4953 init_sync_kiocb(&kiocb
, file
);
4956 if (issue_flags
& IO_URING_F_NONBLOCK
)
4957 kiocb
.ki_flags
|= IOCB_NOWAIT
;
4959 start
= ALIGN_DOWN(pos
, fs_info
->sectorsize
);
4960 lockend
= start
+ BTRFS_MAX_UNCOMPRESSED
- 1;
4962 ret
= btrfs_encoded_read(&kiocb
, &iter
, &args
, &cached_state
,
4963 &disk_bytenr
, &disk_io_size
);
4964 if (ret
< 0 && ret
!= -EIOCBQUEUED
)
4967 file_accessed(file
);
4969 if (copy_to_user(sqe_addr
+ copy_end
, (const char *)&args
+ copy_end_kernel
,
4970 sizeof(args
) - copy_end_kernel
)) {
4971 if (ret
== -EIOCBQUEUED
) {
4972 unlock_extent(io_tree
, start
, lockend
, &cached_state
);
4973 btrfs_inode_unlock(inode
, BTRFS_ILOCK_SHARED
);
4979 if (ret
== -EIOCBQUEUED
) {
4983 * If we've optimized things by storing the iovecs on the stack,
4987 iov
= kmalloc(sizeof(struct iovec
) * args
.iovcnt
, GFP_NOFS
);
4989 unlock_extent(io_tree
, start
, lockend
, &cached_state
);
4990 btrfs_inode_unlock(inode
, BTRFS_ILOCK_SHARED
);
4995 memcpy(iov
, iovstack
, sizeof(struct iovec
) * args
.iovcnt
);
4998 count
= min_t(u64
, iov_iter_count(&iter
), disk_io_size
);
5000 /* Match ioctl by not returning past EOF if uncompressed. */
5001 if (!args
.compression
)
5002 count
= min_t(u64
, count
, args
.len
);
5004 ret
= btrfs_uring_read_extent(&kiocb
, &iter
, start
, lockend
,
5005 cached_state
, disk_bytenr
,
5006 disk_io_size
, count
,
5007 args
.compression
, iov
, cmd
);
5017 add_rchar(current
, ret
);
5023 int btrfs_uring_cmd(struct io_uring_cmd
*cmd
, unsigned int issue_flags
)
5025 switch (cmd
->cmd_op
) {
5026 case BTRFS_IOC_ENCODED_READ
:
5027 #if defined(CONFIG_64BIT) && defined(CONFIG_COMPAT)
5028 case BTRFS_IOC_ENCODED_READ_32
:
5030 return btrfs_uring_encoded_read(cmd
, issue_flags
);
5036 static int btrfs_ioctl_subvol_sync(struct btrfs_fs_info
*fs_info
, void __user
*argp
)
5038 struct btrfs_root
*root
;
5039 struct btrfs_ioctl_subvol_wait args
= { 0 };
5040 signed long sched_ret
;
5043 bool wait_for_deletion
= false;
5046 if (copy_from_user(&args
, argp
, sizeof(args
)))
5049 switch (args
.mode
) {
5050 case BTRFS_SUBVOL_SYNC_WAIT_FOR_QUEUED
:
5052 * Wait for the first one deleted that waits until all previous
5055 spin_lock(&fs_info
->trans_lock
);
5056 if (!list_empty(&fs_info
->dead_roots
)) {
5057 root
= list_last_entry(&fs_info
->dead_roots
,
5058 struct btrfs_root
, root_list
);
5059 args
.subvolid
= btrfs_root_id(root
);
5062 spin_unlock(&fs_info
->trans_lock
);
5067 case BTRFS_SUBVOL_SYNC_WAIT_FOR_ONE
:
5068 if ((0 < args
.subvolid
&& args
.subvolid
< BTRFS_FIRST_FREE_OBJECTID
) ||
5069 BTRFS_LAST_FREE_OBJECTID
< args
.subvolid
)
5072 case BTRFS_SUBVOL_SYNC_COUNT
:
5073 spin_lock(&fs_info
->trans_lock
);
5074 args
.count
= list_count_nodes(&fs_info
->dead_roots
);
5075 spin_unlock(&fs_info
->trans_lock
);
5076 if (copy_to_user(argp
, &args
, sizeof(args
)))
5079 case BTRFS_SUBVOL_SYNC_PEEK_FIRST
:
5080 spin_lock(&fs_info
->trans_lock
);
5081 /* Last in the list was deleted first. */
5082 if (!list_empty(&fs_info
->dead_roots
)) {
5083 root
= list_last_entry(&fs_info
->dead_roots
,
5084 struct btrfs_root
, root_list
);
5085 args
.subvolid
= btrfs_root_id(root
);
5089 spin_unlock(&fs_info
->trans_lock
);
5090 if (copy_to_user(argp
, &args
, sizeof(args
)))
5093 case BTRFS_SUBVOL_SYNC_PEEK_LAST
:
5094 spin_lock(&fs_info
->trans_lock
);
5095 /* First in the list was deleted last. */
5096 if (!list_empty(&fs_info
->dead_roots
)) {
5097 root
= list_first_entry(&fs_info
->dead_roots
,
5098 struct btrfs_root
, root_list
);
5099 args
.subvolid
= btrfs_root_id(root
);
5103 spin_unlock(&fs_info
->trans_lock
);
5104 if (copy_to_user(argp
, &args
, sizeof(args
)))
5111 /* 32bit limitation: fs_roots_radix key is not wide enough. */
5112 if (sizeof(unsigned long) != sizeof(u64
) && args
.subvolid
> U32_MAX
)
5116 /* Wait for the specific one. */
5117 if (down_read_interruptible(&fs_info
->subvol_sem
) == -EINTR
)
5120 spin_lock(&fs_info
->fs_roots_radix_lock
);
5121 root
= radix_tree_lookup(&fs_info
->fs_roots_radix
,
5122 (unsigned long)args
.subvolid
);
5124 spin_lock(&root
->root_item_lock
);
5125 refs
= btrfs_root_refs(&root
->root_item
);
5126 root_flags
= btrfs_root_flags(&root
->root_item
);
5127 spin_unlock(&root
->root_item_lock
);
5129 spin_unlock(&fs_info
->fs_roots_radix_lock
);
5130 up_read(&fs_info
->subvol_sem
);
5132 /* Subvolume does not exist. */
5136 /* Subvolume not deleted at all. */
5139 /* We've waited and now the subvolume is gone. */
5140 if (wait_for_deletion
&& refs
== -1) {
5141 /* Return the one we waited for as the last one. */
5142 if (copy_to_user(argp
, &args
, sizeof(args
)))
5147 /* Subvolume not found on the first try (deleted or never existed). */
5151 wait_for_deletion
= true;
5152 ASSERT(root_flags
& BTRFS_ROOT_SUBVOL_DEAD
);
5153 sched_ret
= schedule_timeout_interruptible(HZ
);
5154 /* Early wake up or error. */
5162 long btrfs_ioctl(struct file
*file
, unsigned int
5163 cmd
, unsigned long arg
)
5165 struct inode
*inode
= file_inode(file
);
5166 struct btrfs_fs_info
*fs_info
= inode_to_fs_info(inode
);
5167 struct btrfs_root
*root
= BTRFS_I(inode
)->root
;
5168 void __user
*argp
= (void __user
*)arg
;
5171 case FS_IOC_GETVERSION
:
5172 return btrfs_ioctl_getversion(inode
, argp
);
5173 case FS_IOC_GETFSLABEL
:
5174 return btrfs_ioctl_get_fslabel(fs_info
, argp
);
5175 case FS_IOC_SETFSLABEL
:
5176 return btrfs_ioctl_set_fslabel(file
, argp
);
5178 return btrfs_ioctl_fitrim(fs_info
, argp
);
5179 case BTRFS_IOC_SNAP_CREATE
:
5180 return btrfs_ioctl_snap_create(file
, argp
, 0);
5181 case BTRFS_IOC_SNAP_CREATE_V2
:
5182 return btrfs_ioctl_snap_create_v2(file
, argp
, 0);
5183 case BTRFS_IOC_SUBVOL_CREATE
:
5184 return btrfs_ioctl_snap_create(file
, argp
, 1);
5185 case BTRFS_IOC_SUBVOL_CREATE_V2
:
5186 return btrfs_ioctl_snap_create_v2(file
, argp
, 1);
5187 case BTRFS_IOC_SNAP_DESTROY
:
5188 return btrfs_ioctl_snap_destroy(file
, argp
, false);
5189 case BTRFS_IOC_SNAP_DESTROY_V2
:
5190 return btrfs_ioctl_snap_destroy(file
, argp
, true);
5191 case BTRFS_IOC_SUBVOL_GETFLAGS
:
5192 return btrfs_ioctl_subvol_getflags(inode
, argp
);
5193 case BTRFS_IOC_SUBVOL_SETFLAGS
:
5194 return btrfs_ioctl_subvol_setflags(file
, argp
);
5195 case BTRFS_IOC_DEFAULT_SUBVOL
:
5196 return btrfs_ioctl_default_subvol(file
, argp
);
5197 case BTRFS_IOC_DEFRAG
:
5198 return btrfs_ioctl_defrag(file
, NULL
);
5199 case BTRFS_IOC_DEFRAG_RANGE
:
5200 return btrfs_ioctl_defrag(file
, argp
);
5201 case BTRFS_IOC_RESIZE
:
5202 return btrfs_ioctl_resize(file
, argp
);
5203 case BTRFS_IOC_ADD_DEV
:
5204 return btrfs_ioctl_add_dev(fs_info
, argp
);
5205 case BTRFS_IOC_RM_DEV
:
5206 return btrfs_ioctl_rm_dev(file
, argp
);
5207 case BTRFS_IOC_RM_DEV_V2
:
5208 return btrfs_ioctl_rm_dev_v2(file
, argp
);
5209 case BTRFS_IOC_FS_INFO
:
5210 return btrfs_ioctl_fs_info(fs_info
, argp
);
5211 case BTRFS_IOC_DEV_INFO
:
5212 return btrfs_ioctl_dev_info(fs_info
, argp
);
5213 case BTRFS_IOC_TREE_SEARCH
:
5214 return btrfs_ioctl_tree_search(inode
, argp
);
5215 case BTRFS_IOC_TREE_SEARCH_V2
:
5216 return btrfs_ioctl_tree_search_v2(inode
, argp
);
5217 case BTRFS_IOC_INO_LOOKUP
:
5218 return btrfs_ioctl_ino_lookup(root
, argp
);
5219 case BTRFS_IOC_INO_PATHS
:
5220 return btrfs_ioctl_ino_to_path(root
, argp
);
5221 case BTRFS_IOC_LOGICAL_INO
:
5222 return btrfs_ioctl_logical_to_ino(fs_info
, argp
, 1);
5223 case BTRFS_IOC_LOGICAL_INO_V2
:
5224 return btrfs_ioctl_logical_to_ino(fs_info
, argp
, 2);
5225 case BTRFS_IOC_SPACE_INFO
:
5226 return btrfs_ioctl_space_info(fs_info
, argp
);
5227 case BTRFS_IOC_SYNC
: {
5230 ret
= btrfs_start_delalloc_roots(fs_info
, LONG_MAX
, false);
5233 ret
= btrfs_sync_fs(inode
->i_sb
, 1);
5235 * There may be work for the cleaner kthread to do (subvolume
5236 * deletion, delayed iputs, defrag inodes, etc), so wake it up.
5238 wake_up_process(fs_info
->cleaner_kthread
);
5241 case BTRFS_IOC_START_SYNC
:
5242 return btrfs_ioctl_start_sync(root
, argp
);
5243 case BTRFS_IOC_WAIT_SYNC
:
5244 return btrfs_ioctl_wait_sync(fs_info
, argp
);
5245 case BTRFS_IOC_SCRUB
:
5246 return btrfs_ioctl_scrub(file
, argp
);
5247 case BTRFS_IOC_SCRUB_CANCEL
:
5248 return btrfs_ioctl_scrub_cancel(fs_info
);
5249 case BTRFS_IOC_SCRUB_PROGRESS
:
5250 return btrfs_ioctl_scrub_progress(fs_info
, argp
);
5251 case BTRFS_IOC_BALANCE_V2
:
5252 return btrfs_ioctl_balance(file
, argp
);
5253 case BTRFS_IOC_BALANCE_CTL
:
5254 return btrfs_ioctl_balance_ctl(fs_info
, arg
);
5255 case BTRFS_IOC_BALANCE_PROGRESS
:
5256 return btrfs_ioctl_balance_progress(fs_info
, argp
);
5257 case BTRFS_IOC_SET_RECEIVED_SUBVOL
:
5258 return btrfs_ioctl_set_received_subvol(file
, argp
);
5260 case BTRFS_IOC_SET_RECEIVED_SUBVOL_32
:
5261 return btrfs_ioctl_set_received_subvol_32(file
, argp
);
5263 case BTRFS_IOC_SEND
:
5264 return _btrfs_ioctl_send(BTRFS_I(inode
), argp
, false);
5265 #if defined(CONFIG_64BIT) && defined(CONFIG_COMPAT)
5266 case BTRFS_IOC_SEND_32
:
5267 return _btrfs_ioctl_send(BTRFS_I(inode
), argp
, true);
5269 case BTRFS_IOC_GET_DEV_STATS
:
5270 return btrfs_ioctl_get_dev_stats(fs_info
, argp
);
5271 case BTRFS_IOC_QUOTA_CTL
:
5272 return btrfs_ioctl_quota_ctl(file
, argp
);
5273 case BTRFS_IOC_QGROUP_ASSIGN
:
5274 return btrfs_ioctl_qgroup_assign(file
, argp
);
5275 case BTRFS_IOC_QGROUP_CREATE
:
5276 return btrfs_ioctl_qgroup_create(file
, argp
);
5277 case BTRFS_IOC_QGROUP_LIMIT
:
5278 return btrfs_ioctl_qgroup_limit(file
, argp
);
5279 case BTRFS_IOC_QUOTA_RESCAN
:
5280 return btrfs_ioctl_quota_rescan(file
, argp
);
5281 case BTRFS_IOC_QUOTA_RESCAN_STATUS
:
5282 return btrfs_ioctl_quota_rescan_status(fs_info
, argp
);
5283 case BTRFS_IOC_QUOTA_RESCAN_WAIT
:
5284 return btrfs_ioctl_quota_rescan_wait(fs_info
);
5285 case BTRFS_IOC_DEV_REPLACE
:
5286 return btrfs_ioctl_dev_replace(fs_info
, argp
);
5287 case BTRFS_IOC_GET_SUPPORTED_FEATURES
:
5288 return btrfs_ioctl_get_supported_features(argp
);
5289 case BTRFS_IOC_GET_FEATURES
:
5290 return btrfs_ioctl_get_features(fs_info
, argp
);
5291 case BTRFS_IOC_SET_FEATURES
:
5292 return btrfs_ioctl_set_features(file
, argp
);
5293 case BTRFS_IOC_GET_SUBVOL_INFO
:
5294 return btrfs_ioctl_get_subvol_info(inode
, argp
);
5295 case BTRFS_IOC_GET_SUBVOL_ROOTREF
:
5296 return btrfs_ioctl_get_subvol_rootref(root
, argp
);
5297 case BTRFS_IOC_INO_LOOKUP_USER
:
5298 return btrfs_ioctl_ino_lookup_user(file
, argp
);
5299 case FS_IOC_ENABLE_VERITY
:
5300 return fsverity_ioctl_enable(file
, (const void __user
*)argp
);
5301 case FS_IOC_MEASURE_VERITY
:
5302 return fsverity_ioctl_measure(file
, argp
);
5303 case BTRFS_IOC_ENCODED_READ
:
5304 return btrfs_ioctl_encoded_read(file
, argp
, false);
5305 case BTRFS_IOC_ENCODED_WRITE
:
5306 return btrfs_ioctl_encoded_write(file
, argp
, false);
5307 #if defined(CONFIG_64BIT) && defined(CONFIG_COMPAT)
5308 case BTRFS_IOC_ENCODED_READ_32
:
5309 return btrfs_ioctl_encoded_read(file
, argp
, true);
5310 case BTRFS_IOC_ENCODED_WRITE_32
:
5311 return btrfs_ioctl_encoded_write(file
, argp
, true);
5313 case BTRFS_IOC_SUBVOL_SYNC_WAIT
:
5314 return btrfs_ioctl_subvol_sync(fs_info
, argp
);
5320 #ifdef CONFIG_COMPAT
5321 long btrfs_compat_ioctl(struct file
*file
, unsigned int cmd
, unsigned long arg
)
5324 * These all access 32-bit values anyway so no further
5325 * handling is necessary.
5328 case FS_IOC32_GETVERSION
:
5329 cmd
= FS_IOC_GETVERSION
;
5333 return btrfs_ioctl(file
, cmd
, (unsigned long) compat_ptr(arg
));