]> git.proxmox.com Git - mirror_lxc.git/blame - src/lxc/conf.h
network: Fixes bug in macvlan mode selection
[mirror_lxc.git] / src / lxc / conf.h
CommitLineData
0ad19a3f 1/*
2 * lxc: linux Container library
3 *
4 * (C) Copyright IBM Corp. 2007, 2008
5 *
6 * Authors:
9afe19d6 7 * Daniel Lezcano <daniel.lezcano at free.fr>
0ad19a3f 8 *
9 * This library is free software; you can redistribute it and/or
10 * modify it under the terms of the GNU Lesser General Public
11 * License as published by the Free Software Foundation; either
12 * version 2.1 of the License, or (at your option) any later version.
13 *
14 * This library is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
17 * Lesser General Public License for more details.
18 *
19 * You should have received a copy of the GNU Lesser General Public
20 * License along with this library; if not, write to the Free Software
250b1eec 21 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
0ad19a3f 22 */
f1a4a029
ÇO
23#ifndef __LXC_CONF_H
24#define __LXC_CONF_H
0ad19a3f 25
d38dd64a
CB
26#ifndef _GNU_SOURCE
27#define _GNU_SOURCE 1
28#endif
9e99997b 29#include <linux/magic.h>
74a2b586 30#include <net/if.h>
1a0e70ac 31#include <netinet/in.h>
d38dd64a
CB
32#include <stdbool.h>
33#include <stdio.h>
b0a33c1e 34#include <sys/param.h>
8173e600 35#include <sys/types.h>
9e99997b
CB
36#include <sys/vfs.h>
37
d7f19646 38#include "compiler.h"
d38dd64a 39#include "config.h"
f2363e38 40#include "list.h"
732375f5 41#include "ringbuf.h"
d38dd64a 42#include "start.h"
0ed9b1bc 43#include "terminal.h"
e3b4c4c4 44
d38dd64a
CB
45#if HAVE_SYS_RESOURCE_H
46#include <sys/resource.h>
47#endif
48
769872f9
SH
49#if HAVE_SCMP_FILTER_CTX
50typedef void * scmp_filter_ctx;
51#endif
52
97e9cfa0
SH
53/* worth moving to configure.ac? */
54#define subuidfile "/etc/subuid"
55#define subgidfile "/etc/subgid"
56
0ad19a3f 57/*
43654d34
CB
58 * Defines a generic struct to configure the control group. It is up to the
59 * programmer to specify the right subsystem.
ec64264d 60 * @subsystem : the targeted subsystem
576f946d 61 * @value : the value to set
54860ed0
CB
62 * @version : The version of the cgroup filesystem on which the controller
63 * resides.
43654d34
CB
64 *
65 * @controllers : The controllers to use for this container.
66 * @dir : The name of the directory containing the container's cgroup.
67 * Not that this is a per-container setting.
0ad19a3f 68 */
69struct lxc_cgroup {
43654d34
CB
70 union {
71 /* information about a specific controller */
72 struct /* controller */ {
54860ed0 73 int version;
43654d34
CB
74 char *subsystem;
75 char *value;
76 };
77
78 /* meta information about cgroup configuration */
79 struct /* meta */ {
80 char *controllers;
81 char *dir;
9caee129 82 bool relative;
43654d34
CB
83 };
84 };
0ad19a3f 85};
86
c6d09e15 87#if !HAVE_SYS_RESOURCE_H
3a0e314d 88#define RLIM_INFINITY ((unsigned long)-1)
c6d09e15
WB
89struct rlimit {
90 unsigned long rlim_cur;
91 unsigned long rlim_max;
92};
93#endif
3a0e314d 94
c6d09e15
WB
95/*
96 * Defines a structure to configure resource limits to set via setrlimit().
97 * @resource : the resource name in lowercase without the RLIMIT_ prefix
98 * @limit : the limit to set
99 */
100struct lxc_limit {
101 char *resource;
102 struct rlimit limit;
103};
104
f6d3e3e4
SH
105enum idtype {
106 ID_TYPE_UID,
107 ID_TYPE_GID
108};
109
7edd0540
L
110/*
111 * Defines a structure to configure kernel parameters at runtime.
112 * @key : the kernel parameters will be configured without the "lxc.sysctl" prefix
113 * @value : the value to set
114 */
115struct lxc_sysctl {
116 char *key;
117 char *value;
118};
119
61d7a733
YT
120/*
121 * Defines a structure to configure proc filesystem at runtime.
122 * @filename : the proc filesystem will be configured without the "lxc.proc" prefix
123 * @value : the value to set
124 */
125struct lxc_proc {
126 char *filename;
127 char *value;
128};
129
f6d3e3e4
SH
130/*
131 * id_map is an id map entry. Form in confile is:
bdcbb6b3
CB
132 * lxc.idmap = u 0 9800 100
133 * lxc.idmap = u 1000 9900 100
134 * lxc.idmap = g 0 9800 100
135 * lxc.idmap = g 1000 9900 100
251d0d2a
DE
136 * meaning the container can use uids and gids 0-99 and 1000-1099,
137 * with [ug]id 0 mapping to [ug]id 9800 on the host, and [ug]id 1000 to
138 * [ug]id 9900 on the host.
f6d3e3e4
SH
139 */
140struct id_map {
141 enum idtype idtype;
251d0d2a 142 unsigned long hostid, nsid, range;
f6d3e3e4
SH
143};
144
0e4be3cf 145/* Defines the number of tty configured and contains the
a589434e 146 * instantiated ptys
885766f5 147 * @max = number of configured ttys
b0a33c1e 148 */
149struct lxc_tty_info {
885766f5
CB
150 size_t max;
151 char *dir;
152 char *tty_names;
2520facd 153 struct lxc_terminal_info *tty;
b0a33c1e 154};
155
13bb312d 156/* Defines a structure to store the rootfs location, the
33fcb7a0 157 * optionals pivot_root, rootfs mount paths
59bb8698
SH
158 * @path : the rootfs source (directory or device)
159 * @mount : where it is mounted
b3b8c97f 160 * @bev_type : optional backing store type
3437f95c
CB
161 * @options : mount options
162 * @mountflags : the portion of @options that are flags
b98318f4 163 * @data : the portion of @options that are not flags
6e54330c 164 * @managed : whether it is managed by LXC
33fcb7a0
DL
165 */
166struct lxc_rootfs {
167 char *path;
23b7ea69 168 char *mount;
b3b8c97f 169 char *bdev_type;
3437f95c
CB
170 char *options;
171 unsigned long mountflags;
172 char *data;
6e54330c 173 bool managed;
33fcb7a0
DL
174};
175
368bbc02
CS
176/*
177 * Automatic mounts for LXC to perform inside the container
178 */
179enum {
3a0e314d
CB
180 LXC_AUTO_PROC_RW = 0x001, /* /proc read-write */
181 LXC_AUTO_PROC_MIXED = 0x002, /* /proc/sys and /proc/sysrq-trigger read-only */
b06b8511
CS
182 LXC_AUTO_PROC_MASK = 0x003,
183
3a0e314d
CB
184 LXC_AUTO_SYS_RW = 0x004, /* /sys */
185 LXC_AUTO_SYS_RO = 0x008, /* /sys read-only */
186 LXC_AUTO_SYS_MIXED = 0x00C, /* /sys read-only and /sys/class/net read-write */
b06b8511
CS
187 LXC_AUTO_SYS_MASK = 0x00C,
188
3a0e314d
CB
189 LXC_AUTO_CGROUP_RO = 0x010, /* /sys/fs/cgroup (partial mount, read-only) */
190 LXC_AUTO_CGROUP_RW = 0x020, /* /sys/fs/cgroup (partial mount, read-write) */
191 LXC_AUTO_CGROUP_MIXED = 0x030, /* /sys/fs/cgroup (partial mount, paths r/o, cgroup r/w) */
192 LXC_AUTO_CGROUP_FULL_RO = 0x040, /* /sys/fs/cgroup (full mount, read-only) */
193 LXC_AUTO_CGROUP_FULL_RW = 0x050, /* /sys/fs/cgroup (full mount, read-write) */
194 LXC_AUTO_CGROUP_FULL_MIXED = 0x060, /* /sys/fs/cgroup (full mount, parent r/o, own r/w) */
195 /*
196 * These are defined in such a way as to retain binary compatibility
197 * with earlier versions of this code. If the previous mask is applied,
198 * both of these will default back to the _MIXED variants, which is
199 * safe.
200 */
201 LXC_AUTO_CGROUP_NOSPEC = 0x0B0, /* /sys/fs/cgroup (partial mount, r/w or mixed, depending on caps) */
202 LXC_AUTO_CGROUP_FULL_NOSPEC = 0x0E0, /* /sys/fs/cgroup (full mount, r/w or mixed, depending on caps) */
203 LXC_AUTO_CGROUP_FORCE = 0x100, /* mount cgroups even when cgroup namespaces are supported */
204 LXC_AUTO_CGROUP_MASK = 0x1F0, /* all known cgroup options, doe not contain LXC_AUTO_CGROUP_FORCE */
adf0ba1f
LT
205
206 LXC_AUTO_SHMOUNTS = 0x200, /* shared mount point */
207 LXC_AUTO_SHMOUNTS_MASK = 0x200, /* shared mount point mask */
3a0e314d 208 LXC_AUTO_ALL_MASK = 0x1FF, /* all known settings */
368bbc02
CS
209};
210
26ddeedd 211enum lxchooks {
1a0e70ac
CB
212 LXCHOOK_PRESTART,
213 LXCHOOK_PREMOUNT,
214 LXCHOOK_MOUNT,
215 LXCHOOK_AUTODEV,
216 LXCHOOK_START,
217 LXCHOOK_STOP,
218 LXCHOOK_POSTSTOP,
219 LXCHOOK_CLONE,
220 LXCHOOK_DESTROY,
08dd2805 221 LXCHOOK_START_HOST,
1a0e70ac
CB
222 NUM_LXC_HOOKS
223};
72d0e1cb 224
811ef482 225extern char *lxchook_names[NUM_LXC_HOOKS];
7b35f3d6 226
d39b10eb
CB
227struct lxc_state_client {
228 int clientfd;
229 lxc_state_t states[MAX_STATE];
230};
231
571e6ec8 232struct lxc_conf {
c7b17051
CB
233 /* Pointer to the name of the container. Do not free! */
234 const char *name;
07c4ea31 235 bool is_execute;
91480a0f 236 int reboot;
9b8e3c96 237 signed long personality;
571e6ec8 238 struct utsname *utsname;
edd64e17 239
54860ed0
CB
240 struct {
241 struct lxc_list cgroup;
242 struct lxc_list cgroup2;
243 };
edd64e17 244
46ad64ab
CB
245 struct {
246 struct lxc_list id_map;
c7e345ae 247
edd64e17
CB
248 /*
249 * Pointer to the idmap entry for the container's root uid in
250 * the id_map list. Do not free!
251 */
5173b710 252 const struct id_map *root_nsuid_map;
c7e345ae 253
edd64e17
CB
254 /*
255 * Pointer to the idmap entry for the container's root gid in
256 * the id_map list. Do not free!
257 */
5173b710 258 const struct id_map *root_nsgid_map;
46ad64ab 259 };
edd64e17 260
5f4535a3 261 struct lxc_list network;
448d7b0c
CB
262
263 struct {
264 char *fstab;
265 int auto_mounts;
266 struct lxc_list mount_list;
267 };
268
81810dd1 269 struct lxc_list caps;
1fb86a7c 270 struct lxc_list keepcaps;
885766f5 271
a2db71c0 272 /* /dev/tty<idx> devices */
885766f5 273 struct lxc_tty_info ttys;
a2db71c0
CB
274 /* /dev/console device */
275 struct lxc_terminal console;
276 /* maximum pty devices allowed by devpts mount */
e528c735 277 size_t pty_max;
885766f5 278
32fd6cf3
CB
279 /* set to true when rootfs has been setup */
280 bool rootfs_setup;
33fcb7a0 281 struct lxc_rootfs rootfs;
32fd6cf3 282
b3187a81 283 bool close_all_fds;
44ae0fb6
CB
284
285 struct {
286 unsigned int hooks_version;
287 struct lxc_list hooks[NUM_LXC_HOOKS];
288 };
4a85ce2a 289
fe4de9a6 290 char *lsm_aa_profile;
1800f924
WB
291 char *lsm_aa_profile_computed;
292 bool lsm_aa_profile_created;
293 unsigned int lsm_aa_allow_nesting;
a56e2df9 294 unsigned int lsm_aa_allow_incomplete;
1800f924 295 struct lxc_list lsm_aa_raw;
fe4de9a6 296 char *lsm_se_context;
7a0bcca3 297 bool tmp_umount_proc;
1a0e70ac 298 char *seccomp; /* filename with the seccomp rules */
50d86993 299 unsigned int seccomp_allow_nesting;
769872f9 300#if HAVE_SCMP_FILTER_CTX
d58c6ad0 301 scmp_filter_ctx seccomp_ctx;
cdb2a47f
CB
302#endif
303#if HAVE_DECL_SECCOMP_NOTIF_GET_FD
304 bool has_seccomp_notify;
305 int seccomp_notify_fd;
306 int seccomp_notify_proxy_fd;
86ce1da1 307 struct sockaddr_un seccomp_notify_proxy_addr;
cdb2a47f
CB
308 struct seccomp_notif *seccomp_notify_req;
309 struct seccomp_notif_resp *seccomp_notify_resp;
769872f9 310#endif
72d0e1cb 311 int maincmd_fd;
1a0e70ac
CB
312 unsigned int autodev; /* if 1, mount and fill a /dev at start */
313 int haltsignal; /* signal used to halt container */
314 int rebootsignal; /* signal used to reboot container */
315 int stopsignal; /* signal used to hard stop container */
316 char *rcfile; /* Copy of the top level rcfile we read */
317
b9949538 318 /* Logfile and loglevel can be set in a container config file. Those
7b660465 319 * function as defaults. The defaults can be overridden by command line.
1a0e70ac
CB
320 * However we don't want the command line specified values to be saved
321 * on c->save_config(). So we store the config file specified values
322 * here. */
98020c31
JS
323 char *logfile; /* the logfile as specified in config */
324 int loglevel; /* loglevel as specified in config (if any) */
858377e4 325 int logfd;
9f30a190 326
3590152f
CB
327 unsigned int start_auto;
328 unsigned int start_delay;
ee1e7aa0
SG
329 int start_order;
330 struct lxc_list groups;
76a26f55 331 int nbd_idx;
35120d9c 332
a8dfe4e0 333 /* unshare the mount namespace in the monitor */
226dc30e 334 unsigned int monitor_unshare;
258f8051 335 unsigned int monitor_signal_pdeath;
a8dfe4e0 336
f979ac15
SH
337 /* list of included files */
338 struct lxc_list includes;
4184c3e1
SH
339 /* config entries which are not "lxc.*" are aliens */
340 struct lxc_list aliens;
7c661726
MP
341
342 /* list of environment variables we'll add to the container when
343 * started */
344 struct lxc_list environment;
6b0d5538
SH
345
346 /* text representation of the config file */
347 char *unexpanded_config;
32fd6cf3
CB
348 size_t unexpanded_len;
349 size_t unexpanded_alloced;
67c660d0 350
5cda27c1
SH
351 /* default command for lxc-execute */
352 char *execute_cmd;
353
67c660d0
SG
354 /* init command */
355 char *init_cmd;
56f8ff00 356
72bb04e4
PT
357 /* if running in a new user namespace, the UID/GID that init and COMMAND
358 * should run under when using lxc-execute */
c5cd20ce
PT
359 uid_t init_uid;
360 gid_t init_gid;
8796becf
CB
361
362 /* indicator if the container will be destroyed on shutdown */
66ffdb1a 363 unsigned int ephemeral;
76d0127f
CB
364
365 /* The facility to pass to syslog. Let's users establish as what type of
366 * program liblxc is supposed to write to the syslog. */
367 char *syslog;
5a46f283
CB
368
369 /* Whether PR_SET_NO_NEW_PRIVS will be set for the container. */
370 bool no_new_privs;
c6d09e15
WB
371
372 /* RLIMIT_* limits */
373 struct lxc_list limits;
7ec2e32a 374
43654d34
CB
375 /* Contains generic info about the cgroup configuration for this
376 * container. Note that struct lxc_cgroup contains a union. It is only
377 * valid to access the members of the anonymous "meta" struct within
378 * that union.
379 */
380 struct lxc_cgroup cgroup_meta;
28d9e29e 381
b074bbf1 382 struct {
1d8d3676 383 int ns_clone;
abeb5bba 384 int ns_keep;
b074bbf1
CB
385 char *ns_share[LXC_NS_MAX];
386 };
3c491553
L
387
388 /* init working directory */
9e132956 389 char *init_cwd;
3c491553 390
d39b10eb
CB
391 /* A list of clients registered to be informed about a container state. */
392 struct lxc_list state_clients;
7edd0540
L
393
394 /* sysctls */
395 struct lxc_list sysctls;
61d7a733
YT
396
397 /* procs */
398 struct lxc_list procs;
adf0ba1f 399
7a41e857 400 struct shmount {
adf0ba1f
LT
401 /* Absolute path to the shared mount point on the host */
402 char *path_host;
403 /* Absolute path (in the container) to the shared mount point */
404 char *path_cont;
7a41e857 405 } shmount;
571e6ec8
DL
406};
407
a19b974f 408extern int write_id_mapping(enum idtype idtype, pid_t pid, const char *buf,
344c9d81
MPS
409 size_t buf_size);
410
858377e4 411#ifdef HAVE_TLS
d7f19646 412extern thread_local struct lxc_conf *current_config;
858377e4
SH
413#else
414extern struct lxc_conf *current_config;
415#endif
416
1a0e70ac 417extern int run_lxc_hooks(const char *name, char *hook, struct lxc_conf *conf,
14a7b0f9 418 char *argv[]);
cc28d0b0 419extern int detect_shared_rootfs(void);
7b379ab3 420extern struct lxc_conf *lxc_conf_init(void);
8eb5694b 421extern void lxc_conf_free(struct lxc_conf *conf);
0c547523 422extern int pin_rootfs(const char *rootfs);
f6d3e3e4 423extern int lxc_map_ids(struct lxc_list *idmap, pid_t pid);
5e4a62bf 424extern int lxc_create_tty(const char *name, struct lxc_conf *conf);
0e4be3cf 425extern void lxc_delete_tty(struct lxc_tty_info *ttys);
72d0e1cb 426extern int lxc_clear_config_caps(struct lxc_conf *c);
1fb86a7c 427extern int lxc_clear_config_keepcaps(struct lxc_conf *c);
54860ed0 428extern int lxc_clear_cgroups(struct lxc_conf *c, const char *key, int version);
72d0e1cb 429extern int lxc_clear_mount_entries(struct lxc_conf *c);
b099e9e9 430extern int lxc_clear_automounts(struct lxc_conf *c);
12a50cc6 431extern int lxc_clear_hooks(struct lxc_conf *c, const char *key);
7d0eb87e 432extern int lxc_clear_idmaps(struct lxc_conf *c);
ee1e7aa0 433extern int lxc_clear_groups(struct lxc_conf *c);
ab799c0b 434extern int lxc_clear_environment(struct lxc_conf *c);
c6d09e15 435extern int lxc_clear_limits(struct lxc_conf *c, const char *key);
f0d02950 436extern int lxc_delete_autodev(struct lxc_handler *handler);
c7b15d1e 437extern void lxc_clear_includes(struct lxc_conf *conf);
8ce1abc2
CB
438extern int lxc_setup_rootfs_prepare_root(struct lxc_conf *conf,
439 const char *name, const char *lxcpath);
3b988b33 440extern int lxc_setup(struct lxc_handler *handler);
732375f5 441extern int lxc_setup_parent(struct lxc_handler *handler);
c6d09e15 442extern int setup_resource_limits(struct lxc_list *limits, pid_t pid);
339efad9 443extern int find_unmapped_nsid(struct lxc_conf *conf, enum idtype idtype);
1a0e70ac
CB
444extern int mapped_hostid(unsigned id, struct lxc_conf *conf,
445 enum idtype idtype);
41dc7155 446extern int chown_mapped_root(const char *path, struct lxc_conf *conf);
c9b7c33e
CB
447extern int userns_exec_1(struct lxc_conf *conf, int (*fn)(void *), void *data,
448 const char *fn_name);
415a8851
CB
449extern int userns_exec_full(struct lxc_conf *conf, int (*fn)(void *),
450 void *data, const char *fn_name);
a17b1e65
SG
451extern int parse_mntopts(const char *mntopts, unsigned long *mntflags,
452 char **mntdata);
8ce1abc2 453extern int parse_propagationopts(const char *mntopts, unsigned long *pflags);
5112cd70 454extern void tmp_proc_unmount(struct lxc_conf *lxc_conf);
1a0e70ac 455extern void remount_all_slave(void);
97e9cfa0 456extern void suggest_default_idmap(void);
1800f924
WB
457extern FILE *make_anonymous_mount_file(struct lxc_list *mount,
458 bool include_nesting_helpers);
1a0e70ac
CB
459extern struct lxc_list *sort_cgroup_settings(struct lxc_list *cgroup_settings);
460extern unsigned long add_required_remount_flags(const char *s, const char *d,
461 unsigned long flags);
811ef482
CB
462extern int run_script(const char *name, const char *section, const char *script,
463 ...);
14a7b0f9
CB
464extern int run_script_argv(const char *name, unsigned int hook_version,
465 const char *section, const char *script,
466 const char *hookname, char **argsin);
b635e92d 467extern int in_caplist(int cap, struct lxc_list *caps);
7edd0540
L
468extern int setup_sysctl_parameters(struct lxc_list *sysctls);
469extern int lxc_clear_sysctls(struct lxc_conf *c, const char *key);
61d7a733
YT
470extern int setup_proc_filesystem(struct lxc_list *procs, pid_t pid);
471extern int lxc_clear_procs(struct lxc_conf *c, const char *key);
1800f924 472extern int lxc_clear_apparmor_raw(struct lxc_conf *c);
a3ed9b81 473extern int lxc_clear_namespace(struct lxc_conf *c);
5ae72b98 474
1a0e70ac 475#endif /* __LXC_CONF_H */