]> git.proxmox.com Git - mirror_lxc.git/blame - src/lxc/conf.h
confile: cleanup parse_line()
[mirror_lxc.git] / src / lxc / conf.h
CommitLineData
cc73685d
CB
1/* SPDX-License-Identifier: LGPL-2.1+ */
2
f1a4a029
ÇO
3#ifndef __LXC_CONF_H
4#define __LXC_CONF_H
0ad19a3f 5
d38dd64a
CB
6#ifndef _GNU_SOURCE
7#define _GNU_SOURCE 1
8#endif
9e99997b 9#include <linux/magic.h>
74a2b586 10#include <net/if.h>
1a0e70ac 11#include <netinet/in.h>
d38dd64a
CB
12#include <stdbool.h>
13#include <stdio.h>
b0a33c1e 14#include <sys/param.h>
8173e600 15#include <sys/types.h>
9e99997b
CB
16#include <sys/vfs.h>
17
d7f19646 18#include "compiler.h"
d38dd64a 19#include "config.h"
f2363e38 20#include "list.h"
c3e3c21a 21#include "lxcseccomp.h"
ee91fa06 22#include "memory_utils.h"
732375f5 23#include "ringbuf.h"
d38dd64a 24#include "start.h"
0ed9b1bc 25#include "terminal.h"
e3b4c4c4 26
d38dd64a
CB
27#if HAVE_SYS_RESOURCE_H
28#include <sys/resource.h>
29#endif
30
769872f9
SH
31#if HAVE_SCMP_FILTER_CTX
32typedef void * scmp_filter_ctx;
33#endif
34
97e9cfa0
SH
35/* worth moving to configure.ac? */
36#define subuidfile "/etc/subuid"
37#define subgidfile "/etc/subgid"
38
0ad19a3f 39/*
43654d34
CB
40 * Defines a generic struct to configure the control group. It is up to the
41 * programmer to specify the right subsystem.
ec64264d 42 * @subsystem : the targeted subsystem
576f946d 43 * @value : the value to set
54860ed0
CB
44 * @version : The version of the cgroup filesystem on which the controller
45 * resides.
43654d34
CB
46 *
47 * @controllers : The controllers to use for this container.
48 * @dir : The name of the directory containing the container's cgroup.
49 * Not that this is a per-container setting.
0ad19a3f 50 */
51struct lxc_cgroup {
43654d34
CB
52 union {
53 /* information about a specific controller */
54 struct /* controller */ {
54860ed0 55 int version;
43654d34
CB
56 char *subsystem;
57 char *value;
58 };
59
60 /* meta information about cgroup configuration */
61 struct /* meta */ {
62 char *controllers;
63 char *dir;
a900cbaf 64 char *monitor_dir;
7696c1f9 65 char *monitor_pivot_dir;
a900cbaf
WB
66 char *container_dir;
67 char *namespace_dir;
9caee129 68 bool relative;
43654d34
CB
69 };
70 };
0ad19a3f 71};
72
ee91fa06
CB
73static void free_lxc_cgroup(struct lxc_cgroup *ptr)
74{
75 if (ptr) {
76 free(ptr->subsystem);
77 free(ptr->value);
78 free_disarm(ptr);
79 }
80}
81define_cleanup_function(struct lxc_cgroup *, free_lxc_cgroup);
82
c6d09e15 83#if !HAVE_SYS_RESOURCE_H
3a0e314d 84#define RLIM_INFINITY ((unsigned long)-1)
c6d09e15
WB
85struct rlimit {
86 unsigned long rlim_cur;
87 unsigned long rlim_max;
88};
89#endif
3a0e314d 90
c6d09e15
WB
91/*
92 * Defines a structure to configure resource limits to set via setrlimit().
93 * @resource : the resource name in lowercase without the RLIMIT_ prefix
94 * @limit : the limit to set
95 */
96struct lxc_limit {
97 char *resource;
98 struct rlimit limit;
99};
100
8fa831e0
CB
101static void free_lxc_limit(struct lxc_limit *ptr)
102{
103 if (ptr) {
104 free(ptr->resource);
105 free_disarm(ptr);
106 }
107}
108define_cleanup_function(struct lxc_limit *, free_lxc_limit);
109
f6d3e3e4
SH
110enum idtype {
111 ID_TYPE_UID,
112 ID_TYPE_GID
113};
114
7edd0540
L
115/*
116 * Defines a structure to configure kernel parameters at runtime.
117 * @key : the kernel parameters will be configured without the "lxc.sysctl" prefix
118 * @value : the value to set
119 */
120struct lxc_sysctl {
121 char *key;
122 char *value;
123};
124
f10c80d2
CB
125static void free_lxc_sysctl(struct lxc_sysctl *ptr)
126{
127 if (ptr) {
128 free(ptr->key);
129 free(ptr->value);
130 free_disarm(ptr);
131 }
132}
133define_cleanup_function(struct lxc_sysctl *, free_lxc_sysctl);
134
61d7a733
YT
135/*
136 * Defines a structure to configure proc filesystem at runtime.
137 * @filename : the proc filesystem will be configured without the "lxc.proc" prefix
138 * @value : the value to set
139 */
140struct lxc_proc {
141 char *filename;
142 char *value;
143};
144
83332c24
CB
145static void free_lxc_proc(struct lxc_proc *ptr)
146{
147 if (ptr) {
148 free(ptr->filename);
149 free(ptr->value);
150 free_disarm(ptr);
151 }
152}
153define_cleanup_function(struct lxc_proc *, free_lxc_proc);
154
f6d3e3e4
SH
155/*
156 * id_map is an id map entry. Form in confile is:
bdcbb6b3
CB
157 * lxc.idmap = u 0 9800 100
158 * lxc.idmap = u 1000 9900 100
159 * lxc.idmap = g 0 9800 100
160 * lxc.idmap = g 1000 9900 100
251d0d2a
DE
161 * meaning the container can use uids and gids 0-99 and 1000-1099,
162 * with [ug]id 0 mapping to [ug]id 9800 on the host, and [ug]id 1000 to
163 * [ug]id 9900 on the host.
f6d3e3e4
SH
164 */
165struct id_map {
166 enum idtype idtype;
251d0d2a 167 unsigned long hostid, nsid, range;
f6d3e3e4
SH
168};
169
0e4be3cf 170/* Defines the number of tty configured and contains the
a589434e 171 * instantiated ptys
885766f5 172 * @max = number of configured ttys
b0a33c1e 173 */
174struct lxc_tty_info {
885766f5
CB
175 size_t max;
176 char *dir;
177 char *tty_names;
2520facd 178 struct lxc_terminal_info *tty;
b0a33c1e 179};
180
13bb312d 181/* Defines a structure to store the rootfs location, the
33fcb7a0 182 * optionals pivot_root, rootfs mount paths
953db219
CB
183 * @path : the rootfs source (directory or device)
184 * @mount : where it is mounted
185 * @bev_type : optional backing store type
186 * @options : mount options
187 * @mountflags : the portion of @options that are flags
188 * @data : the portion of @options that are not flags
189 * @managed : whether it is managed by LXC
190 * @mntpt_fd : fd for @mount
191 * @dev_mntpt_fd : fd for /dev of the container
33fcb7a0
DL
192 */
193struct lxc_rootfs {
31f8b2fd 194 int mntpt_fd;
953db219 195 int dev_mntpt_fd;
33fcb7a0 196 char *path;
23b7ea69 197 char *mount;
b3b8c97f 198 char *bdev_type;
3437f95c
CB
199 char *options;
200 unsigned long mountflags;
201 char *data;
6e54330c 202 bool managed;
33fcb7a0
DL
203};
204
368bbc02
CS
205/*
206 * Automatic mounts for LXC to perform inside the container
207 */
208enum {
3a0e314d
CB
209 LXC_AUTO_PROC_RW = 0x001, /* /proc read-write */
210 LXC_AUTO_PROC_MIXED = 0x002, /* /proc/sys and /proc/sysrq-trigger read-only */
b06b8511
CS
211 LXC_AUTO_PROC_MASK = 0x003,
212
3a0e314d
CB
213 LXC_AUTO_SYS_RW = 0x004, /* /sys */
214 LXC_AUTO_SYS_RO = 0x008, /* /sys read-only */
215 LXC_AUTO_SYS_MIXED = 0x00C, /* /sys read-only and /sys/class/net read-write */
b06b8511
CS
216 LXC_AUTO_SYS_MASK = 0x00C,
217
3a0e314d
CB
218 LXC_AUTO_CGROUP_RO = 0x010, /* /sys/fs/cgroup (partial mount, read-only) */
219 LXC_AUTO_CGROUP_RW = 0x020, /* /sys/fs/cgroup (partial mount, read-write) */
220 LXC_AUTO_CGROUP_MIXED = 0x030, /* /sys/fs/cgroup (partial mount, paths r/o, cgroup r/w) */
221 LXC_AUTO_CGROUP_FULL_RO = 0x040, /* /sys/fs/cgroup (full mount, read-only) */
222 LXC_AUTO_CGROUP_FULL_RW = 0x050, /* /sys/fs/cgroup (full mount, read-write) */
223 LXC_AUTO_CGROUP_FULL_MIXED = 0x060, /* /sys/fs/cgroup (full mount, parent r/o, own r/w) */
224 /*
225 * These are defined in such a way as to retain binary compatibility
226 * with earlier versions of this code. If the previous mask is applied,
227 * both of these will default back to the _MIXED variants, which is
228 * safe.
229 */
230 LXC_AUTO_CGROUP_NOSPEC = 0x0B0, /* /sys/fs/cgroup (partial mount, r/w or mixed, depending on caps) */
231 LXC_AUTO_CGROUP_FULL_NOSPEC = 0x0E0, /* /sys/fs/cgroup (full mount, r/w or mixed, depending on caps) */
232 LXC_AUTO_CGROUP_FORCE = 0x100, /* mount cgroups even when cgroup namespaces are supported */
233 LXC_AUTO_CGROUP_MASK = 0x1F0, /* all known cgroup options, doe not contain LXC_AUTO_CGROUP_FORCE */
adf0ba1f
LT
234
235 LXC_AUTO_SHMOUNTS = 0x200, /* shared mount point */
236 LXC_AUTO_SHMOUNTS_MASK = 0x200, /* shared mount point mask */
3a0e314d 237 LXC_AUTO_ALL_MASK = 0x1FF, /* all known settings */
368bbc02
CS
238};
239
26ddeedd 240enum lxchooks {
1a0e70ac
CB
241 LXCHOOK_PRESTART,
242 LXCHOOK_PREMOUNT,
243 LXCHOOK_MOUNT,
244 LXCHOOK_AUTODEV,
245 LXCHOOK_START,
246 LXCHOOK_STOP,
247 LXCHOOK_POSTSTOP,
248 LXCHOOK_CLONE,
249 LXCHOOK_DESTROY,
08dd2805 250 LXCHOOK_START_HOST,
1a0e70ac
CB
251 NUM_LXC_HOOKS
252};
72d0e1cb 253
59eac805 254__hidden extern char *lxchook_names[NUM_LXC_HOOKS];
7b35f3d6 255
d39b10eb
CB
256struct lxc_state_client {
257 int clientfd;
258 lxc_state_t states[MAX_STATE];
259};
260
fda39d45 261enum {
356e71c6 262 LXC_BPF_DEVICE_CGROUP_LOCAL_RULE = -1,
29a01c37
CB
263 LXC_BPF_DEVICE_CGROUP_ALLOWLIST = 0,
264 LXC_BPF_DEVICE_CGROUP_DENYLIST = 1,
fda39d45
CB
265};
266
4bfb655e
CB
267struct device_item {
268 char type;
269 int major;
270 int minor;
271 char access[4];
272 int allow;
fda39d45
CB
273 /*
274 * LXC_BPF_DEVICE_CGROUP_LOCAL_RULE -> no global rule
29a01c37
CB
275 * LXC_BPF_DEVICE_CGROUP_ALLOWLIST -> allowlist (deny all)
276 * LXC_BPF_DEVICE_CGROUP_DENYLIST -> denylist (allow all)
2a63b5cb
CB
277 */
278 int global_rule;
4bfb655e
CB
279};
280
70fd7fc9
CB
281struct timens_offsets {
282 /* Currently, either s_boot or ns_boot is set, but not both. */
283 int64_t s_boot;
284 int64_t ns_boot;
285
286 /* Currently, either s_monotonic or ns_monotonic is set, but not both. */
287 int64_t s_monotonic;
288 int64_t ns_monotonic;
289};
290
571e6ec8 291struct lxc_conf {
c7b17051
CB
292 /* Pointer to the name of the container. Do not free! */
293 const char *name;
07c4ea31 294 bool is_execute;
91480a0f 295 int reboot;
9b8e3c96 296 signed long personality;
571e6ec8 297 struct utsname *utsname;
edd64e17 298
54860ed0
CB
299 struct {
300 struct lxc_list cgroup;
301 struct lxc_list cgroup2;
bf651989 302 struct bpf_program *cgroup2_devices;
4bfb655e
CB
303 /* This should be reimplemented as a hashmap. */
304 struct lxc_list devices;
54860ed0 305 };
edd64e17 306
46ad64ab
CB
307 struct {
308 struct lxc_list id_map;
c7e345ae 309
edd64e17
CB
310 /*
311 * Pointer to the idmap entry for the container's root uid in
312 * the id_map list. Do not free!
313 */
5173b710 314 const struct id_map *root_nsuid_map;
c7e345ae 315
edd64e17
CB
316 /*
317 * Pointer to the idmap entry for the container's root gid in
318 * the id_map list. Do not free!
319 */
5173b710 320 const struct id_map *root_nsgid_map;
46ad64ab 321 };
edd64e17 322
5f4535a3 323 struct lxc_list network;
448d7b0c
CB
324
325 struct {
326 char *fstab;
327 int auto_mounts;
328 struct lxc_list mount_list;
329 };
330
81810dd1 331 struct lxc_list caps;
1fb86a7c 332 struct lxc_list keepcaps;
885766f5 333
a2db71c0 334 /* /dev/tty<idx> devices */
885766f5 335 struct lxc_tty_info ttys;
a2db71c0
CB
336 /* /dev/console device */
337 struct lxc_terminal console;
338 /* maximum pty devices allowed by devpts mount */
e528c735 339 size_t pty_max;
f797f05e
CB
340 /* file descriptor for the container's /dev/pts mount */
341 int devpts_fd;
885766f5 342
32fd6cf3
CB
343 /* set to true when rootfs has been setup */
344 bool rootfs_setup;
33fcb7a0 345 struct lxc_rootfs rootfs;
32fd6cf3 346
b3187a81 347 bool close_all_fds;
44ae0fb6
CB
348
349 struct {
350 unsigned int hooks_version;
351 struct lxc_list hooks[NUM_LXC_HOOKS];
352 };
4a85ce2a 353
fe4de9a6 354 char *lsm_aa_profile;
1800f924
WB
355 char *lsm_aa_profile_computed;
356 bool lsm_aa_profile_created;
357 unsigned int lsm_aa_allow_nesting;
a56e2df9 358 unsigned int lsm_aa_allow_incomplete;
1800f924 359 struct lxc_list lsm_aa_raw;
fe4de9a6 360 char *lsm_se_context;
4fef78bc 361 char *lsm_se_keyring_context;
8f818a84 362 bool keyring_disable_session;
7a0bcca3 363 bool tmp_umount_proc;
c3e3c21a 364 struct lxc_seccomp seccomp;
72d0e1cb 365 int maincmd_fd;
1a0e70ac 366 unsigned int autodev; /* if 1, mount and fill a /dev at start */
63012bdd 367 int autodevtmpfssize; /* size of the /dev tmpfs */
1a0e70ac
CB
368 int haltsignal; /* signal used to halt container */
369 int rebootsignal; /* signal used to reboot container */
370 int stopsignal; /* signal used to hard stop container */
371 char *rcfile; /* Copy of the top level rcfile we read */
372
b9949538 373 /* Logfile and loglevel can be set in a container config file. Those
7b660465 374 * function as defaults. The defaults can be overridden by command line.
1a0e70ac
CB
375 * However we don't want the command line specified values to be saved
376 * on c->save_config(). So we store the config file specified values
377 * here. */
98020c31
JS
378 char *logfile; /* the logfile as specified in config */
379 int loglevel; /* loglevel as specified in config (if any) */
858377e4 380 int logfd;
9f30a190 381
3590152f
CB
382 unsigned int start_auto;
383 unsigned int start_delay;
ee1e7aa0
SG
384 int start_order;
385 struct lxc_list groups;
76a26f55 386 int nbd_idx;
35120d9c 387
a8dfe4e0 388 /* unshare the mount namespace in the monitor */
226dc30e 389 unsigned int monitor_unshare;
258f8051 390 unsigned int monitor_signal_pdeath;
a8dfe4e0 391
f979ac15
SH
392 /* list of included files */
393 struct lxc_list includes;
4184c3e1
SH
394 /* config entries which are not "lxc.*" are aliens */
395 struct lxc_list aliens;
7c661726
MP
396
397 /* list of environment variables we'll add to the container when
398 * started */
399 struct lxc_list environment;
6b0d5538
SH
400
401 /* text representation of the config file */
402 char *unexpanded_config;
32fd6cf3
CB
403 size_t unexpanded_len;
404 size_t unexpanded_alloced;
67c660d0 405
5cda27c1
SH
406 /* default command for lxc-execute */
407 char *execute_cmd;
408
67c660d0
SG
409 /* init command */
410 char *init_cmd;
56f8ff00 411
72bb04e4
PT
412 /* if running in a new user namespace, the UID/GID that init and COMMAND
413 * should run under when using lxc-execute */
c5cd20ce
PT
414 uid_t init_uid;
415 gid_t init_gid;
8796becf
CB
416
417 /* indicator if the container will be destroyed on shutdown */
66ffdb1a 418 unsigned int ephemeral;
76d0127f
CB
419
420 /* The facility to pass to syslog. Let's users establish as what type of
421 * program liblxc is supposed to write to the syslog. */
422 char *syslog;
5a46f283
CB
423
424 /* Whether PR_SET_NO_NEW_PRIVS will be set for the container. */
425 bool no_new_privs;
c6d09e15
WB
426
427 /* RLIMIT_* limits */
428 struct lxc_list limits;
7ec2e32a 429
43654d34
CB
430 /* Contains generic info about the cgroup configuration for this
431 * container. Note that struct lxc_cgroup contains a union. It is only
432 * valid to access the members of the anonymous "meta" struct within
433 * that union.
434 */
435 struct lxc_cgroup cgroup_meta;
28d9e29e 436
b074bbf1 437 struct {
1d8d3676 438 int ns_clone;
abeb5bba 439 int ns_keep;
b074bbf1
CB
440 char *ns_share[LXC_NS_MAX];
441 };
3c491553
L
442
443 /* init working directory */
9e132956 444 char *init_cwd;
3c491553 445
d39b10eb
CB
446 /* A list of clients registered to be informed about a container state. */
447 struct lxc_list state_clients;
7edd0540
L
448
449 /* sysctls */
450 struct lxc_list sysctls;
61d7a733
YT
451
452 /* procs */
453 struct lxc_list procs;
adf0ba1f 454
7a41e857 455 struct shmount {
adf0ba1f
LT
456 /* Absolute path to the shared mount point on the host */
457 char *path_host;
458 /* Absolute path (in the container) to the shared mount point */
459 char *path_cont;
7a41e857 460 } shmount;
70fd7fc9
CB
461
462 struct timens_offsets timens;
571e6ec8
DL
463};
464
efb7e304
CB
465__hidden extern int write_id_mapping(enum idtype idtype, pid_t pid, const char *buf, size_t buf_size)
466 __access_r(3, 4);
344c9d81 467
858377e4 468#ifdef HAVE_TLS
d7f19646 469extern thread_local struct lxc_conf *current_config;
858377e4
SH
470#else
471extern struct lxc_conf *current_config;
472#endif
473
efb7e304
CB
474__hidden extern int run_lxc_hooks(const char *name, char *hook, struct lxc_conf *conf, char *argv[]);
475__hidden extern struct lxc_conf *lxc_conf_init(void);
476__hidden extern void lxc_conf_free(struct lxc_conf *conf);
477__hidden extern int pin_rootfs(const char *rootfs);
478__hidden extern int lxc_map_ids(struct lxc_list *idmap, pid_t pid);
479__hidden extern int lxc_create_tty(const char *name, struct lxc_conf *conf);
480__hidden extern void lxc_delete_tty(struct lxc_tty_info *ttys);
481__hidden extern int lxc_clear_config_caps(struct lxc_conf *c);
482__hidden extern int lxc_clear_config_keepcaps(struct lxc_conf *c);
483__hidden extern int lxc_clear_cgroups(struct lxc_conf *c, const char *key, int version);
484__hidden extern int lxc_clear_mount_entries(struct lxc_conf *c);
485__hidden extern int lxc_clear_automounts(struct lxc_conf *c);
486__hidden extern int lxc_clear_hooks(struct lxc_conf *c, const char *key);
487__hidden extern int lxc_clear_idmaps(struct lxc_conf *c);
488__hidden extern int lxc_clear_groups(struct lxc_conf *c);
489__hidden extern int lxc_clear_environment(struct lxc_conf *c);
490__hidden extern int lxc_clear_limits(struct lxc_conf *c, const char *key);
491__hidden extern int lxc_delete_autodev(struct lxc_handler *handler);
492__hidden extern int lxc_clear_autodev_tmpfs_size(struct lxc_conf *c);
493__hidden extern void lxc_clear_includes(struct lxc_conf *conf);
494__hidden extern int lxc_setup_rootfs_prepare_root(struct lxc_conf *conf, const char *name,
495 const char *lxcpath);
496__hidden extern int lxc_setup(struct lxc_handler *handler);
497__hidden extern int lxc_setup_parent(struct lxc_handler *handler);
498__hidden extern int setup_resource_limits(struct lxc_list *limits, pid_t pid);
499__hidden extern int find_unmapped_nsid(const struct lxc_conf *conf, enum idtype idtype);
500__hidden extern int mapped_hostid(unsigned id, const struct lxc_conf *conf, enum idtype idtype);
501__hidden extern int userns_exec_1(const struct lxc_conf *conf, int (*fn)(void *), void *data,
502 const char *fn_name);
503__hidden extern int userns_exec_full(struct lxc_conf *conf, int (*fn)(void *), void *data,
504 const char *fn_name);
505__hidden extern int parse_mntopts(const char *mntopts, unsigned long *mntflags, char **mntdata);
506__hidden extern int parse_propagationopts(const char *mntopts, unsigned long *pflags);
507__hidden extern void tmp_proc_unmount(struct lxc_conf *lxc_conf);
508__hidden extern void turn_into_dependent_mounts(void);
509__hidden extern void suggest_default_idmap(void);
510__hidden extern FILE *make_anonymous_mount_file(struct lxc_list *mount, bool include_nesting_helpers);
511__hidden extern struct lxc_list *sort_cgroup_settings(struct lxc_list *cgroup_settings);
512__hidden extern unsigned long add_required_remount_flags(const char *s, const char *d,
513 unsigned long flags);
514__hidden extern int run_script(const char *name, const char *section, const char *script, ...);
515__hidden extern int run_script_argv(const char *name, unsigned int hook_version, const char *section,
516 const char *script, const char *hookname, char **argsin);
517__hidden extern int in_caplist(int cap, struct lxc_list *caps);
518__hidden extern int setup_sysctl_parameters(struct lxc_list *sysctls);
519__hidden extern int lxc_clear_sysctls(struct lxc_conf *c, const char *key);
520__hidden extern int setup_proc_filesystem(struct lxc_list *procs, pid_t pid);
521__hidden extern int lxc_clear_procs(struct lxc_conf *c, const char *key);
522__hidden extern int lxc_clear_apparmor_raw(struct lxc_conf *c);
523__hidden extern int lxc_clear_namespace(struct lxc_conf *c);
524__hidden extern int userns_exec_minimal(const struct lxc_conf *conf, int (*fn_parent)(void *),
525 void *fn_parent_data, int (*fn_child)(void *),
526 void *fn_child_data);
527__hidden extern int userns_exec_mapped_root(const char *path, int path_fd,
528 const struct lxc_conf *conf);
6e1a327a
CB
529static inline int chown_mapped_root(const char *path, const struct lxc_conf *conf)
530{
531 return userns_exec_mapped_root(path, -EBADF, conf);
532}
5ae72b98 533
68f3899e
CB
534__hidden int lxc_setup_devpts_parent(struct lxc_handler *handler);
535
1a0e70ac 536#endif /* __LXC_CONF_H */