]> git.proxmox.com Git - mirror_lxc.git/blame - src/lxc/conf.h
conf: stash lxc_storage into lxc_rootfs and bind to its lifetime
[mirror_lxc.git] / src / lxc / conf.h
CommitLineData
cc73685d
CB
1/* SPDX-License-Identifier: LGPL-2.1+ */
2
f1a4a029
ÇO
3#ifndef __LXC_CONF_H
4#define __LXC_CONF_H
0ad19a3f 5
d38dd64a
CB
6#ifndef _GNU_SOURCE
7#define _GNU_SOURCE 1
8#endif
9e99997b 9#include <linux/magic.h>
74a2b586 10#include <net/if.h>
1a0e70ac 11#include <netinet/in.h>
d38dd64a
CB
12#include <stdbool.h>
13#include <stdio.h>
b0a33c1e 14#include <sys/param.h>
8173e600 15#include <sys/types.h>
9e99997b
CB
16#include <sys/vfs.h>
17
4822319f 18#include "attach_options.h"
d84b26bc 19#include "caps.h"
d7f19646 20#include "compiler.h"
d38dd64a 21#include "config.h"
f2363e38 22#include "list.h"
c3e3c21a 23#include "lxcseccomp.h"
ee91fa06 24#include "memory_utils.h"
732375f5 25#include "ringbuf.h"
d38dd64a 26#include "start.h"
4e86cad3 27#include "storage/storage.h"
02efd041 28#include "string_utils.h"
0ed9b1bc 29#include "terminal.h"
e3b4c4c4 30
d38dd64a
CB
31#if HAVE_SYS_RESOURCE_H
32#include <sys/resource.h>
33#endif
34
769872f9
SH
35#if HAVE_SCMP_FILTER_CTX
36typedef void * scmp_filter_ctx;
37#endif
38
97e9cfa0
SH
39/* worth moving to configure.ac? */
40#define subuidfile "/etc/subuid"
41#define subgidfile "/etc/subgid"
42
0ad19a3f 43/*
43654d34
CB
44 * Defines a generic struct to configure the control group. It is up to the
45 * programmer to specify the right subsystem.
ec64264d 46 * @subsystem : the targeted subsystem
576f946d 47 * @value : the value to set
54860ed0
CB
48 * @version : The version of the cgroup filesystem on which the controller
49 * resides.
43654d34
CB
50 *
51 * @controllers : The controllers to use for this container.
52 * @dir : The name of the directory containing the container's cgroup.
53 * Not that this is a per-container setting.
0ad19a3f 54 */
55struct lxc_cgroup {
43654d34
CB
56 union {
57 /* information about a specific controller */
58 struct /* controller */ {
54860ed0 59 int version;
43654d34
CB
60 char *subsystem;
61 char *value;
62 };
63
64 /* meta information about cgroup configuration */
65 struct /* meta */ {
66 char *controllers;
67 char *dir;
a900cbaf 68 char *monitor_dir;
7696c1f9 69 char *monitor_pivot_dir;
a900cbaf
WB
70 char *container_dir;
71 char *namespace_dir;
9caee129 72 bool relative;
43654d34
CB
73 };
74 };
0ad19a3f 75};
76
ee91fa06
CB
77static void free_lxc_cgroup(struct lxc_cgroup *ptr)
78{
79 if (ptr) {
80 free(ptr->subsystem);
81 free(ptr->value);
82 free_disarm(ptr);
83 }
84}
85define_cleanup_function(struct lxc_cgroup *, free_lxc_cgroup);
86
c6d09e15 87#if !HAVE_SYS_RESOURCE_H
3a0e314d 88#define RLIM_INFINITY ((unsigned long)-1)
c6d09e15
WB
89struct rlimit {
90 unsigned long rlim_cur;
91 unsigned long rlim_max;
92};
93#endif
3a0e314d 94
c6d09e15
WB
95/*
96 * Defines a structure to configure resource limits to set via setrlimit().
97 * @resource : the resource name in lowercase without the RLIMIT_ prefix
98 * @limit : the limit to set
99 */
100struct lxc_limit {
101 char *resource;
102 struct rlimit limit;
103};
104
8fa831e0
CB
105static void free_lxc_limit(struct lxc_limit *ptr)
106{
107 if (ptr) {
631d2715 108 free_disarm(ptr->resource);
8fa831e0
CB
109 free_disarm(ptr);
110 }
111}
112define_cleanup_function(struct lxc_limit *, free_lxc_limit);
113
f6d3e3e4
SH
114enum idtype {
115 ID_TYPE_UID,
116 ID_TYPE_GID
117};
118
7edd0540
L
119/*
120 * Defines a structure to configure kernel parameters at runtime.
121 * @key : the kernel parameters will be configured without the "lxc.sysctl" prefix
122 * @value : the value to set
123 */
124struct lxc_sysctl {
125 char *key;
126 char *value;
127};
128
f10c80d2
CB
129static void free_lxc_sysctl(struct lxc_sysctl *ptr)
130{
131 if (ptr) {
132 free(ptr->key);
133 free(ptr->value);
134 free_disarm(ptr);
135 }
136}
137define_cleanup_function(struct lxc_sysctl *, free_lxc_sysctl);
138
61d7a733
YT
139/*
140 * Defines a structure to configure proc filesystem at runtime.
141 * @filename : the proc filesystem will be configured without the "lxc.proc" prefix
142 * @value : the value to set
143 */
144struct lxc_proc {
145 char *filename;
146 char *value;
147};
148
83332c24
CB
149static void free_lxc_proc(struct lxc_proc *ptr)
150{
151 if (ptr) {
152 free(ptr->filename);
153 free(ptr->value);
154 free_disarm(ptr);
155 }
156}
157define_cleanup_function(struct lxc_proc *, free_lxc_proc);
158
f6d3e3e4
SH
159/*
160 * id_map is an id map entry. Form in confile is:
bdcbb6b3
CB
161 * lxc.idmap = u 0 9800 100
162 * lxc.idmap = u 1000 9900 100
163 * lxc.idmap = g 0 9800 100
164 * lxc.idmap = g 1000 9900 100
251d0d2a
DE
165 * meaning the container can use uids and gids 0-99 and 1000-1099,
166 * with [ug]id 0 mapping to [ug]id 9800 on the host, and [ug]id 1000 to
167 * [ug]id 9900 on the host.
f6d3e3e4
SH
168 */
169struct id_map {
170 enum idtype idtype;
251d0d2a 171 unsigned long hostid, nsid, range;
f6d3e3e4
SH
172};
173
0e4be3cf 174/* Defines the number of tty configured and contains the
a589434e 175 * instantiated ptys
885766f5 176 * @max = number of configured ttys
b0a33c1e 177 */
178struct lxc_tty_info {
885766f5
CB
179 size_t max;
180 char *dir;
181 char *tty_names;
2520facd 182 struct lxc_terminal_info *tty;
b0a33c1e 183};
184
0b932f9d
CB
185typedef enum lxc_mount_options_t {
186 LXC_MOUNT_CREATE_DIR = 0,
187 LXC_MOUNT_CREATE_FILE = 1,
188 LXC_MOUNT_OPTIONAL = 2,
189 LXC_MOUNT_RELATIVE = 3,
f6815906
CB
190 LXC_MOUNT_IDMAP = 4,
191 LXC_MOUNT_MAX = 5,
0b932f9d
CB
192} lxc_mount_options_t;
193
194__hidden extern const char *lxc_mount_options_info[LXC_MOUNT_MAX];
195
196struct lxc_mount_options {
197 int create_dir : 1;
198 int create_file : 1;
199 int optional : 1;
200 int relative : 1;
f6815906 201 char userns_path[PATH_MAX];
e26cf563 202 int userns_fd;
0b932f9d
CB
203};
204
13bb312d 205/* Defines a structure to store the rootfs location, the
33fcb7a0 206 * optionals pivot_root, rootfs mount paths
953db219
CB
207 * @path : the rootfs source (directory or device)
208 * @mount : where it is mounted
952b5031 209 * @buf : static buffer to construct paths
953db219
CB
210 * @bev_type : optional backing store type
211 * @options : mount options
212 * @mountflags : the portion of @options that are flags
213 * @data : the portion of @options that are not flags
214 * @managed : whether it is managed by LXC
ea57e424 215 * @dfd_mnt : fd for @mount
a5a08920 216 * @dfd_dev : fd for /dev of the container
33fcb7a0
DL
217 */
218struct lxc_rootfs {
ea11a215 219 int dfd_host;
79ff643d 220
33fcb7a0 221 char *path;
79ff643d
CB
222 int fd_path_pin;
223
224 int dfd_mnt;
23b7ea69 225 char *mount;
79ff643d
CB
226
227 int dfd_dev;
228
952b5031 229 char buf[PATH_MAX];
b3b8c97f 230 char *bdev_type;
3437f95c
CB
231 char *options;
232 unsigned long mountflags;
233 char *data;
6e54330c 234 bool managed;
0b932f9d 235 struct lxc_mount_options mnt_opts;
4e86cad3 236 struct lxc_storage *storage;
33fcb7a0
DL
237};
238
368bbc02
CS
239/*
240 * Automatic mounts for LXC to perform inside the container
241 */
242enum {
3a0e314d
CB
243 LXC_AUTO_PROC_RW = 0x001, /* /proc read-write */
244 LXC_AUTO_PROC_MIXED = 0x002, /* /proc/sys and /proc/sysrq-trigger read-only */
b06b8511
CS
245 LXC_AUTO_PROC_MASK = 0x003,
246
3a0e314d
CB
247 LXC_AUTO_SYS_RW = 0x004, /* /sys */
248 LXC_AUTO_SYS_RO = 0x008, /* /sys read-only */
249 LXC_AUTO_SYS_MIXED = 0x00C, /* /sys read-only and /sys/class/net read-write */
b06b8511
CS
250 LXC_AUTO_SYS_MASK = 0x00C,
251
3a0e314d
CB
252 LXC_AUTO_CGROUP_RO = 0x010, /* /sys/fs/cgroup (partial mount, read-only) */
253 LXC_AUTO_CGROUP_RW = 0x020, /* /sys/fs/cgroup (partial mount, read-write) */
254 LXC_AUTO_CGROUP_MIXED = 0x030, /* /sys/fs/cgroup (partial mount, paths r/o, cgroup r/w) */
255 LXC_AUTO_CGROUP_FULL_RO = 0x040, /* /sys/fs/cgroup (full mount, read-only) */
256 LXC_AUTO_CGROUP_FULL_RW = 0x050, /* /sys/fs/cgroup (full mount, read-write) */
257 LXC_AUTO_CGROUP_FULL_MIXED = 0x060, /* /sys/fs/cgroup (full mount, parent r/o, own r/w) */
258 /*
259 * These are defined in such a way as to retain binary compatibility
260 * with earlier versions of this code. If the previous mask is applied,
261 * both of these will default back to the _MIXED variants, which is
262 * safe.
263 */
264 LXC_AUTO_CGROUP_NOSPEC = 0x0B0, /* /sys/fs/cgroup (partial mount, r/w or mixed, depending on caps) */
265 LXC_AUTO_CGROUP_FULL_NOSPEC = 0x0E0, /* /sys/fs/cgroup (full mount, r/w or mixed, depending on caps) */
266 LXC_AUTO_CGROUP_FORCE = 0x100, /* mount cgroups even when cgroup namespaces are supported */
6cc501f3 267 LXC_AUTO_CGROUP_MASK = 0x1F0, /* all known cgroup options */
adf0ba1f
LT
268
269 LXC_AUTO_SHMOUNTS = 0x200, /* shared mount point */
270 LXC_AUTO_SHMOUNTS_MASK = 0x200, /* shared mount point mask */
3a0e314d 271 LXC_AUTO_ALL_MASK = 0x1FF, /* all known settings */
368bbc02
CS
272};
273
26ddeedd 274enum lxchooks {
1a0e70ac
CB
275 LXCHOOK_PRESTART,
276 LXCHOOK_PREMOUNT,
277 LXCHOOK_MOUNT,
278 LXCHOOK_AUTODEV,
279 LXCHOOK_START,
280 LXCHOOK_STOP,
281 LXCHOOK_POSTSTOP,
282 LXCHOOK_CLONE,
283 LXCHOOK_DESTROY,
08dd2805 284 LXCHOOK_START_HOST,
1a0e70ac
CB
285 NUM_LXC_HOOKS
286};
72d0e1cb 287
59eac805 288__hidden extern char *lxchook_names[NUM_LXC_HOOKS];
7b35f3d6 289
d39b10eb
CB
290struct lxc_state_client {
291 int clientfd;
292 lxc_state_t states[MAX_STATE];
293};
294
4b9dc703 295typedef enum lxc_bpf_devices_rule_t {
4b9dc703
CB
296 LXC_BPF_DEVICE_CGROUP_ALLOWLIST = 0,
297 LXC_BPF_DEVICE_CGROUP_DENYLIST = 1,
298} lxc_bpf_devices_rule_t;
fda39d45 299
4bfb655e
CB
300struct device_item {
301 char type;
302 int major;
303 int minor;
304 char access[4];
305 int allow;
a134099d
CB
306};
307
308struct bpf_devices {
309 lxc_bpf_devices_rule_t list_type;
310 struct lxc_list device_item;
4bfb655e
CB
311};
312
70fd7fc9
CB
313struct timens_offsets {
314 /* Currently, either s_boot or ns_boot is set, but not both. */
315 int64_t s_boot;
316 int64_t ns_boot;
317
318 /* Currently, either s_monotonic or ns_monotonic is set, but not both. */
319 int64_t s_monotonic;
320 int64_t ns_monotonic;
321};
322
571e6ec8 323struct lxc_conf {
c7b17051
CB
324 /* Pointer to the name of the container. Do not free! */
325 const char *name;
07c4ea31 326 bool is_execute;
91480a0f 327 int reboot;
9b8e3c96 328 signed long personality;
571e6ec8 329 struct utsname *utsname;
edd64e17 330
54860ed0
CB
331 struct {
332 struct lxc_list cgroup;
333 struct lxc_list cgroup2;
a134099d 334 struct bpf_devices bpf_devices;
54860ed0 335 };
edd64e17 336
46ad64ab
CB
337 struct {
338 struct lxc_list id_map;
c7e345ae 339
edd64e17
CB
340 /*
341 * Pointer to the idmap entry for the container's root uid in
342 * the id_map list. Do not free!
343 */
5173b710 344 const struct id_map *root_nsuid_map;
c7e345ae 345
edd64e17
CB
346 /*
347 * Pointer to the idmap entry for the container's root gid in
348 * the id_map list. Do not free!
349 */
5173b710 350 const struct id_map *root_nsgid_map;
46ad64ab 351 };
edd64e17 352
5f4535a3 353 struct lxc_list network;
448d7b0c
CB
354
355 struct {
356 char *fstab;
357 int auto_mounts;
358 struct lxc_list mount_list;
359 };
360
81810dd1 361 struct lxc_list caps;
1fb86a7c 362 struct lxc_list keepcaps;
885766f5 363
a2db71c0 364 /* /dev/tty<idx> devices */
885766f5 365 struct lxc_tty_info ttys;
a2db71c0
CB
366 /* /dev/console device */
367 struct lxc_terminal console;
368 /* maximum pty devices allowed by devpts mount */
e528c735 369 size_t pty_max;
f797f05e
CB
370 /* file descriptor for the container's /dev/pts mount */
371 int devpts_fd;
885766f5 372
32fd6cf3
CB
373 /* set to true when rootfs has been setup */
374 bool rootfs_setup;
33fcb7a0 375 struct lxc_rootfs rootfs;
32fd6cf3 376
b3187a81 377 bool close_all_fds;
44ae0fb6
CB
378
379 struct {
380 unsigned int hooks_version;
381 struct lxc_list hooks[NUM_LXC_HOOKS];
382 };
4a85ce2a 383
fe4de9a6 384 char *lsm_aa_profile;
1800f924
WB
385 char *lsm_aa_profile_computed;
386 bool lsm_aa_profile_created;
387 unsigned int lsm_aa_allow_nesting;
a56e2df9 388 unsigned int lsm_aa_allow_incomplete;
1800f924 389 struct lxc_list lsm_aa_raw;
fe4de9a6 390 char *lsm_se_context;
4fef78bc 391 char *lsm_se_keyring_context;
8f818a84 392 bool keyring_disable_session;
952b5031 393 bool transient_procfs_mnt;
c3e3c21a 394 struct lxc_seccomp seccomp;
72d0e1cb 395 int maincmd_fd;
1a0e70ac 396 unsigned int autodev; /* if 1, mount and fill a /dev at start */
63012bdd 397 int autodevtmpfssize; /* size of the /dev tmpfs */
1a0e70ac
CB
398 int haltsignal; /* signal used to halt container */
399 int rebootsignal; /* signal used to reboot container */
400 int stopsignal; /* signal used to hard stop container */
401 char *rcfile; /* Copy of the top level rcfile we read */
402
b9949538 403 /* Logfile and loglevel can be set in a container config file. Those
7b660465 404 * function as defaults. The defaults can be overridden by command line.
1a0e70ac
CB
405 * However we don't want the command line specified values to be saved
406 * on c->save_config(). So we store the config file specified values
407 * here. */
98020c31
JS
408 char *logfile; /* the logfile as specified in config */
409 int loglevel; /* loglevel as specified in config (if any) */
858377e4 410 int logfd;
9f30a190 411
3590152f
CB
412 unsigned int start_auto;
413 unsigned int start_delay;
ee1e7aa0
SG
414 int start_order;
415 struct lxc_list groups;
76a26f55 416 int nbd_idx;
35120d9c 417
a8dfe4e0 418 /* unshare the mount namespace in the monitor */
226dc30e 419 unsigned int monitor_unshare;
258f8051 420 unsigned int monitor_signal_pdeath;
a8dfe4e0 421
f979ac15
SH
422 /* list of included files */
423 struct lxc_list includes;
4184c3e1
SH
424 /* config entries which are not "lxc.*" are aliens */
425 struct lxc_list aliens;
7c661726
MP
426
427 /* list of environment variables we'll add to the container when
428 * started */
429 struct lxc_list environment;
6b0d5538
SH
430
431 /* text representation of the config file */
432 char *unexpanded_config;
32fd6cf3
CB
433 size_t unexpanded_len;
434 size_t unexpanded_alloced;
67c660d0 435
5cda27c1
SH
436 /* default command for lxc-execute */
437 char *execute_cmd;
438
67c660d0
SG
439 /* init command */
440 char *init_cmd;
56f8ff00 441
4822319f 442 /* The uid to use for the container. */
c5cd20ce 443 uid_t init_uid;
4822319f 444 /* The gid to use for the container. */
c5cd20ce 445 gid_t init_gid;
4822319f
CB
446 /* The groups to use for the container. */
447 lxc_groups_t init_groups;
8796becf
CB
448
449 /* indicator if the container will be destroyed on shutdown */
66ffdb1a 450 unsigned int ephemeral;
76d0127f
CB
451
452 /* The facility to pass to syslog. Let's users establish as what type of
453 * program liblxc is supposed to write to the syslog. */
454 char *syslog;
5a46f283
CB
455
456 /* Whether PR_SET_NO_NEW_PRIVS will be set for the container. */
457 bool no_new_privs;
c6d09e15
WB
458
459 /* RLIMIT_* limits */
460 struct lxc_list limits;
7ec2e32a 461
43654d34
CB
462 /* Contains generic info about the cgroup configuration for this
463 * container. Note that struct lxc_cgroup contains a union. It is only
464 * valid to access the members of the anonymous "meta" struct within
465 * that union.
466 */
467 struct lxc_cgroup cgroup_meta;
28d9e29e 468
b074bbf1 469 struct {
1d8d3676 470 int ns_clone;
abeb5bba 471 int ns_keep;
b074bbf1
CB
472 char *ns_share[LXC_NS_MAX];
473 };
3c491553
L
474
475 /* init working directory */
9e132956 476 char *init_cwd;
3c491553 477
d39b10eb
CB
478 /* A list of clients registered to be informed about a container state. */
479 struct lxc_list state_clients;
7edd0540
L
480
481 /* sysctls */
482 struct lxc_list sysctls;
61d7a733
YT
483
484 /* procs */
485 struct lxc_list procs;
adf0ba1f 486
7a41e857 487 struct shmount {
adf0ba1f
LT
488 /* Absolute path to the shared mount point on the host */
489 char *path_host;
490 /* Absolute path (in the container) to the shared mount point */
491 char *path_cont;
7a41e857 492 } shmount;
70fd7fc9
CB
493
494 struct timens_offsets timens;
571e6ec8
DL
495};
496
efb7e304
CB
497__hidden extern int write_id_mapping(enum idtype idtype, pid_t pid, const char *buf, size_t buf_size)
498 __access_r(3, 4);
344c9d81 499
d7f19646 500extern thread_local struct lxc_conf *current_config;
858377e4 501
efb7e304
CB
502__hidden extern int run_lxc_hooks(const char *name, char *hook, struct lxc_conf *conf, char *argv[]);
503__hidden extern struct lxc_conf *lxc_conf_init(void);
504__hidden extern void lxc_conf_free(struct lxc_conf *conf);
4e86cad3
CB
505__hidden extern int lxc_storage_prepare(struct lxc_conf *conf);
506__hidden extern int lxc_rootfs_prepare(struct lxc_conf *conf, bool userns);
507__hidden extern void lxc_storage_put(struct lxc_conf *conf);
efb7e304
CB
508__hidden extern int lxc_map_ids(struct lxc_list *idmap, pid_t pid);
509__hidden extern int lxc_create_tty(const char *name, struct lxc_conf *conf);
510__hidden extern void lxc_delete_tty(struct lxc_tty_info *ttys);
511__hidden extern int lxc_clear_config_caps(struct lxc_conf *c);
512__hidden extern int lxc_clear_config_keepcaps(struct lxc_conf *c);
513__hidden extern int lxc_clear_cgroups(struct lxc_conf *c, const char *key, int version);
514__hidden extern int lxc_clear_mount_entries(struct lxc_conf *c);
515__hidden extern int lxc_clear_automounts(struct lxc_conf *c);
516__hidden extern int lxc_clear_hooks(struct lxc_conf *c, const char *key);
517__hidden extern int lxc_clear_idmaps(struct lxc_conf *c);
518__hidden extern int lxc_clear_groups(struct lxc_conf *c);
519__hidden extern int lxc_clear_environment(struct lxc_conf *c);
520__hidden extern int lxc_clear_limits(struct lxc_conf *c, const char *key);
521__hidden extern int lxc_delete_autodev(struct lxc_handler *handler);
522__hidden extern int lxc_clear_autodev_tmpfs_size(struct lxc_conf *c);
523__hidden extern void lxc_clear_includes(struct lxc_conf *conf);
524__hidden extern int lxc_setup_rootfs_prepare_root(struct lxc_conf *conf, const char *name,
525 const char *lxcpath);
526__hidden extern int lxc_setup(struct lxc_handler *handler);
527__hidden extern int lxc_setup_parent(struct lxc_handler *handler);
528__hidden extern int setup_resource_limits(struct lxc_list *limits, pid_t pid);
529__hidden extern int find_unmapped_nsid(const struct lxc_conf *conf, enum idtype idtype);
530__hidden extern int mapped_hostid(unsigned id, const struct lxc_conf *conf, enum idtype idtype);
531__hidden extern int userns_exec_1(const struct lxc_conf *conf, int (*fn)(void *), void *data,
532 const char *fn_name);
533__hidden extern int userns_exec_full(struct lxc_conf *conf, int (*fn)(void *), void *data,
534 const char *fn_name);
535__hidden extern int parse_mntopts(const char *mntopts, unsigned long *mntflags, char **mntdata);
536__hidden extern int parse_propagationopts(const char *mntopts, unsigned long *pflags);
16fcdacc 537__hidden extern int parse_lxc_mntopts(struct lxc_mount_options *opts, char *mnt_opts);
efb7e304 538__hidden extern void tmp_proc_unmount(struct lxc_conf *lxc_conf);
efb7e304
CB
539__hidden extern void suggest_default_idmap(void);
540__hidden extern FILE *make_anonymous_mount_file(struct lxc_list *mount, bool include_nesting_helpers);
541__hidden extern struct lxc_list *sort_cgroup_settings(struct lxc_list *cgroup_settings);
efb7e304
CB
542__hidden extern int run_script(const char *name, const char *section, const char *script, ...);
543__hidden extern int run_script_argv(const char *name, unsigned int hook_version, const char *section,
544 const char *script, const char *hookname, char **argsin);
545__hidden extern int in_caplist(int cap, struct lxc_list *caps);
309ae287 546
d84b26bc 547static inline bool lxc_wants_cap(int cap, struct lxc_conf *conf)
309ae287 548{
d84b26bc
CB
549 if (lxc_caps_last_cap() < cap)
550 return false;
551
309ae287 552 if (!lxc_list_empty(&conf->keepcaps))
5d1bf4c4 553 return in_caplist(cap, &conf->keepcaps);
309ae287 554
5d1bf4c4 555 return !in_caplist(cap, &conf->caps);
309ae287
CB
556}
557
efb7e304
CB
558__hidden extern int setup_sysctl_parameters(struct lxc_list *sysctls);
559__hidden extern int lxc_clear_sysctls(struct lxc_conf *c, const char *key);
560__hidden extern int setup_proc_filesystem(struct lxc_list *procs, pid_t pid);
561__hidden extern int lxc_clear_procs(struct lxc_conf *c, const char *key);
562__hidden extern int lxc_clear_apparmor_raw(struct lxc_conf *c);
563__hidden extern int lxc_clear_namespace(struct lxc_conf *c);
564__hidden extern int userns_exec_minimal(const struct lxc_conf *conf, int (*fn_parent)(void *),
565 void *fn_parent_data, int (*fn_child)(void *),
566 void *fn_child_data);
567__hidden extern int userns_exec_mapped_root(const char *path, int path_fd,
568 const struct lxc_conf *conf);
6e1a327a
CB
569static inline int chown_mapped_root(const char *path, const struct lxc_conf *conf)
570{
571 return userns_exec_mapped_root(path, -EBADF, conf);
572}
5ae72b98 573
68f3899e
CB
574__hidden int lxc_setup_devpts_parent(struct lxc_handler *handler);
575
02efd041
CB
576static inline const char *get_rootfs_mnt(const struct lxc_rootfs *rootfs)
577{
578 static const char *s = "/";
579
580 return !is_empty_string(rootfs->path) ? rootfs->mount : s;
581}
582
e26cf563
CB
583static inline bool idmapped_rootfs_mnt(const struct lxc_rootfs *rootfs)
584{
585 return rootfs->mnt_opts.userns_fd >= 0;
586}
587
79ff643d
CB
588static inline void put_lxc_rootfs(struct lxc_rootfs *rootfs, bool unpin)
589{
590 if (rootfs) {
591 close_prot_errno_disarm(rootfs->dfd_host);
592 close_prot_errno_disarm(rootfs->dfd_mnt);
593 close_prot_errno_disarm(rootfs->dfd_dev);
e26cf563 594 close_prot_errno_disarm(rootfs->mnt_opts.userns_fd);
79ff643d
CB
595 if (unpin)
596 close_prot_errno_disarm(rootfs->fd_path_pin);
4e86cad3
CB
597 storage_put(rootfs->storage);
598 rootfs->storage = NULL;
79ff643d
CB
599 }
600}
601
a7744f12
CB
602static inline void lxc_clear_cgroup2_devices(struct bpf_devices *bpf_devices)
603{
604 struct lxc_list *list = &bpf_devices->device_item;
605 struct lxc_list *it, *next;
606
607 lxc_list_for_each_safe (it, list, next) {
608 lxc_list_del(it);
609 free(it);
610 }
611
612 lxc_list_init(&bpf_devices->device_item);
613}
614
1a0e70ac 615#endif /* __LXC_CONF_H */