]>
Commit | Line | Data |
---|---|---|
cc73685d CB |
1 | /* SPDX-License-Identifier: LGPL-2.1+ */ |
2 | ||
f1a4a029 ÇO |
3 | #ifndef __LXC_CONF_H |
4 | #define __LXC_CONF_H | |
0ad19a3f | 5 | |
d38dd64a CB |
6 | #ifndef _GNU_SOURCE |
7 | #define _GNU_SOURCE 1 | |
8 | #endif | |
9e99997b | 9 | #include <linux/magic.h> |
74a2b586 | 10 | #include <net/if.h> |
1a0e70ac | 11 | #include <netinet/in.h> |
d38dd64a CB |
12 | #include <stdbool.h> |
13 | #include <stdio.h> | |
b0a33c1e | 14 | #include <sys/param.h> |
8173e600 | 15 | #include <sys/types.h> |
9e99997b CB |
16 | #include <sys/vfs.h> |
17 | ||
d7f19646 | 18 | #include "compiler.h" |
d38dd64a | 19 | #include "config.h" |
f2363e38 | 20 | #include "list.h" |
c3e3c21a | 21 | #include "lxcseccomp.h" |
ee91fa06 | 22 | #include "memory_utils.h" |
732375f5 | 23 | #include "ringbuf.h" |
d38dd64a | 24 | #include "start.h" |
0ed9b1bc | 25 | #include "terminal.h" |
e3b4c4c4 | 26 | |
d38dd64a CB |
27 | #if HAVE_SYS_RESOURCE_H |
28 | #include <sys/resource.h> | |
29 | #endif | |
30 | ||
769872f9 SH |
31 | #if HAVE_SCMP_FILTER_CTX |
32 | typedef void * scmp_filter_ctx; | |
33 | #endif | |
34 | ||
97e9cfa0 SH |
35 | /* worth moving to configure.ac? */ |
36 | #define subuidfile "/etc/subuid" | |
37 | #define subgidfile "/etc/subgid" | |
38 | ||
0ad19a3f | 39 | /* |
43654d34 CB |
40 | * Defines a generic struct to configure the control group. It is up to the |
41 | * programmer to specify the right subsystem. | |
ec64264d | 42 | * @subsystem : the targeted subsystem |
576f946d | 43 | * @value : the value to set |
54860ed0 CB |
44 | * @version : The version of the cgroup filesystem on which the controller |
45 | * resides. | |
43654d34 CB |
46 | * |
47 | * @controllers : The controllers to use for this container. | |
48 | * @dir : The name of the directory containing the container's cgroup. | |
49 | * Not that this is a per-container setting. | |
0ad19a3f | 50 | */ |
51 | struct lxc_cgroup { | |
43654d34 CB |
52 | union { |
53 | /* information about a specific controller */ | |
54 | struct /* controller */ { | |
54860ed0 | 55 | int version; |
43654d34 CB |
56 | char *subsystem; |
57 | char *value; | |
58 | }; | |
59 | ||
60 | /* meta information about cgroup configuration */ | |
61 | struct /* meta */ { | |
62 | char *controllers; | |
63 | char *dir; | |
a900cbaf | 64 | char *monitor_dir; |
7696c1f9 | 65 | char *monitor_pivot_dir; |
a900cbaf WB |
66 | char *container_dir; |
67 | char *namespace_dir; | |
9caee129 | 68 | bool relative; |
43654d34 CB |
69 | }; |
70 | }; | |
0ad19a3f | 71 | }; |
72 | ||
ee91fa06 CB |
73 | static void free_lxc_cgroup(struct lxc_cgroup *ptr) |
74 | { | |
75 | if (ptr) { | |
76 | free(ptr->subsystem); | |
77 | free(ptr->value); | |
78 | free_disarm(ptr); | |
79 | } | |
80 | } | |
81 | define_cleanup_function(struct lxc_cgroup *, free_lxc_cgroup); | |
82 | ||
c6d09e15 | 83 | #if !HAVE_SYS_RESOURCE_H |
3a0e314d | 84 | #define RLIM_INFINITY ((unsigned long)-1) |
c6d09e15 WB |
85 | struct rlimit { |
86 | unsigned long rlim_cur; | |
87 | unsigned long rlim_max; | |
88 | }; | |
89 | #endif | |
3a0e314d | 90 | |
c6d09e15 WB |
91 | /* |
92 | * Defines a structure to configure resource limits to set via setrlimit(). | |
93 | * @resource : the resource name in lowercase without the RLIMIT_ prefix | |
94 | * @limit : the limit to set | |
95 | */ | |
96 | struct lxc_limit { | |
97 | char *resource; | |
98 | struct rlimit limit; | |
99 | }; | |
100 | ||
8fa831e0 CB |
101 | static void free_lxc_limit(struct lxc_limit *ptr) |
102 | { | |
103 | if (ptr) { | |
104 | free(ptr->resource); | |
105 | free_disarm(ptr); | |
106 | } | |
107 | } | |
108 | define_cleanup_function(struct lxc_limit *, free_lxc_limit); | |
109 | ||
f6d3e3e4 SH |
110 | enum idtype { |
111 | ID_TYPE_UID, | |
112 | ID_TYPE_GID | |
113 | }; | |
114 | ||
7edd0540 L |
115 | /* |
116 | * Defines a structure to configure kernel parameters at runtime. | |
117 | * @key : the kernel parameters will be configured without the "lxc.sysctl" prefix | |
118 | * @value : the value to set | |
119 | */ | |
120 | struct lxc_sysctl { | |
121 | char *key; | |
122 | char *value; | |
123 | }; | |
124 | ||
61d7a733 YT |
125 | /* |
126 | * Defines a structure to configure proc filesystem at runtime. | |
127 | * @filename : the proc filesystem will be configured without the "lxc.proc" prefix | |
128 | * @value : the value to set | |
129 | */ | |
130 | struct lxc_proc { | |
131 | char *filename; | |
132 | char *value; | |
133 | }; | |
134 | ||
f6d3e3e4 SH |
135 | /* |
136 | * id_map is an id map entry. Form in confile is: | |
bdcbb6b3 CB |
137 | * lxc.idmap = u 0 9800 100 |
138 | * lxc.idmap = u 1000 9900 100 | |
139 | * lxc.idmap = g 0 9800 100 | |
140 | * lxc.idmap = g 1000 9900 100 | |
251d0d2a DE |
141 | * meaning the container can use uids and gids 0-99 and 1000-1099, |
142 | * with [ug]id 0 mapping to [ug]id 9800 on the host, and [ug]id 1000 to | |
143 | * [ug]id 9900 on the host. | |
f6d3e3e4 SH |
144 | */ |
145 | struct id_map { | |
146 | enum idtype idtype; | |
251d0d2a | 147 | unsigned long hostid, nsid, range; |
f6d3e3e4 SH |
148 | }; |
149 | ||
0e4be3cf | 150 | /* Defines the number of tty configured and contains the |
a589434e | 151 | * instantiated ptys |
885766f5 | 152 | * @max = number of configured ttys |
b0a33c1e | 153 | */ |
154 | struct lxc_tty_info { | |
885766f5 CB |
155 | size_t max; |
156 | char *dir; | |
157 | char *tty_names; | |
2520facd | 158 | struct lxc_terminal_info *tty; |
b0a33c1e | 159 | }; |
160 | ||
13bb312d | 161 | /* Defines a structure to store the rootfs location, the |
33fcb7a0 | 162 | * optionals pivot_root, rootfs mount paths |
953db219 CB |
163 | * @path : the rootfs source (directory or device) |
164 | * @mount : where it is mounted | |
165 | * @bev_type : optional backing store type | |
166 | * @options : mount options | |
167 | * @mountflags : the portion of @options that are flags | |
168 | * @data : the portion of @options that are not flags | |
169 | * @managed : whether it is managed by LXC | |
170 | * @mntpt_fd : fd for @mount | |
171 | * @dev_mntpt_fd : fd for /dev of the container | |
33fcb7a0 DL |
172 | */ |
173 | struct lxc_rootfs { | |
31f8b2fd | 174 | int mntpt_fd; |
953db219 | 175 | int dev_mntpt_fd; |
33fcb7a0 | 176 | char *path; |
23b7ea69 | 177 | char *mount; |
b3b8c97f | 178 | char *bdev_type; |
3437f95c CB |
179 | char *options; |
180 | unsigned long mountflags; | |
181 | char *data; | |
6e54330c | 182 | bool managed; |
33fcb7a0 DL |
183 | }; |
184 | ||
368bbc02 CS |
185 | /* |
186 | * Automatic mounts for LXC to perform inside the container | |
187 | */ | |
188 | enum { | |
3a0e314d CB |
189 | LXC_AUTO_PROC_RW = 0x001, /* /proc read-write */ |
190 | LXC_AUTO_PROC_MIXED = 0x002, /* /proc/sys and /proc/sysrq-trigger read-only */ | |
b06b8511 CS |
191 | LXC_AUTO_PROC_MASK = 0x003, |
192 | ||
3a0e314d CB |
193 | LXC_AUTO_SYS_RW = 0x004, /* /sys */ |
194 | LXC_AUTO_SYS_RO = 0x008, /* /sys read-only */ | |
195 | LXC_AUTO_SYS_MIXED = 0x00C, /* /sys read-only and /sys/class/net read-write */ | |
b06b8511 CS |
196 | LXC_AUTO_SYS_MASK = 0x00C, |
197 | ||
3a0e314d CB |
198 | LXC_AUTO_CGROUP_RO = 0x010, /* /sys/fs/cgroup (partial mount, read-only) */ |
199 | LXC_AUTO_CGROUP_RW = 0x020, /* /sys/fs/cgroup (partial mount, read-write) */ | |
200 | LXC_AUTO_CGROUP_MIXED = 0x030, /* /sys/fs/cgroup (partial mount, paths r/o, cgroup r/w) */ | |
201 | LXC_AUTO_CGROUP_FULL_RO = 0x040, /* /sys/fs/cgroup (full mount, read-only) */ | |
202 | LXC_AUTO_CGROUP_FULL_RW = 0x050, /* /sys/fs/cgroup (full mount, read-write) */ | |
203 | LXC_AUTO_CGROUP_FULL_MIXED = 0x060, /* /sys/fs/cgroup (full mount, parent r/o, own r/w) */ | |
204 | /* | |
205 | * These are defined in such a way as to retain binary compatibility | |
206 | * with earlier versions of this code. If the previous mask is applied, | |
207 | * both of these will default back to the _MIXED variants, which is | |
208 | * safe. | |
209 | */ | |
210 | LXC_AUTO_CGROUP_NOSPEC = 0x0B0, /* /sys/fs/cgroup (partial mount, r/w or mixed, depending on caps) */ | |
211 | LXC_AUTO_CGROUP_FULL_NOSPEC = 0x0E0, /* /sys/fs/cgroup (full mount, r/w or mixed, depending on caps) */ | |
212 | LXC_AUTO_CGROUP_FORCE = 0x100, /* mount cgroups even when cgroup namespaces are supported */ | |
213 | LXC_AUTO_CGROUP_MASK = 0x1F0, /* all known cgroup options, doe not contain LXC_AUTO_CGROUP_FORCE */ | |
adf0ba1f LT |
214 | |
215 | LXC_AUTO_SHMOUNTS = 0x200, /* shared mount point */ | |
216 | LXC_AUTO_SHMOUNTS_MASK = 0x200, /* shared mount point mask */ | |
3a0e314d | 217 | LXC_AUTO_ALL_MASK = 0x1FF, /* all known settings */ |
368bbc02 CS |
218 | }; |
219 | ||
26ddeedd | 220 | enum lxchooks { |
1a0e70ac CB |
221 | LXCHOOK_PRESTART, |
222 | LXCHOOK_PREMOUNT, | |
223 | LXCHOOK_MOUNT, | |
224 | LXCHOOK_AUTODEV, | |
225 | LXCHOOK_START, | |
226 | LXCHOOK_STOP, | |
227 | LXCHOOK_POSTSTOP, | |
228 | LXCHOOK_CLONE, | |
229 | LXCHOOK_DESTROY, | |
08dd2805 | 230 | LXCHOOK_START_HOST, |
1a0e70ac CB |
231 | NUM_LXC_HOOKS |
232 | }; | |
72d0e1cb | 233 | |
59eac805 | 234 | __hidden extern char *lxchook_names[NUM_LXC_HOOKS]; |
7b35f3d6 | 235 | |
d39b10eb CB |
236 | struct lxc_state_client { |
237 | int clientfd; | |
238 | lxc_state_t states[MAX_STATE]; | |
239 | }; | |
240 | ||
fda39d45 | 241 | enum { |
356e71c6 | 242 | LXC_BPF_DEVICE_CGROUP_LOCAL_RULE = -1, |
29a01c37 CB |
243 | LXC_BPF_DEVICE_CGROUP_ALLOWLIST = 0, |
244 | LXC_BPF_DEVICE_CGROUP_DENYLIST = 1, | |
fda39d45 CB |
245 | }; |
246 | ||
4bfb655e CB |
247 | struct device_item { |
248 | char type; | |
249 | int major; | |
250 | int minor; | |
251 | char access[4]; | |
252 | int allow; | |
fda39d45 CB |
253 | /* |
254 | * LXC_BPF_DEVICE_CGROUP_LOCAL_RULE -> no global rule | |
29a01c37 CB |
255 | * LXC_BPF_DEVICE_CGROUP_ALLOWLIST -> allowlist (deny all) |
256 | * LXC_BPF_DEVICE_CGROUP_DENYLIST -> denylist (allow all) | |
2a63b5cb CB |
257 | */ |
258 | int global_rule; | |
4bfb655e CB |
259 | }; |
260 | ||
70fd7fc9 CB |
261 | struct timens_offsets { |
262 | /* Currently, either s_boot or ns_boot is set, but not both. */ | |
263 | int64_t s_boot; | |
264 | int64_t ns_boot; | |
265 | ||
266 | /* Currently, either s_monotonic or ns_monotonic is set, but not both. */ | |
267 | int64_t s_monotonic; | |
268 | int64_t ns_monotonic; | |
269 | }; | |
270 | ||
571e6ec8 | 271 | struct lxc_conf { |
c7b17051 CB |
272 | /* Pointer to the name of the container. Do not free! */ |
273 | const char *name; | |
07c4ea31 | 274 | bool is_execute; |
91480a0f | 275 | int reboot; |
9b8e3c96 | 276 | signed long personality; |
571e6ec8 | 277 | struct utsname *utsname; |
edd64e17 | 278 | |
54860ed0 CB |
279 | struct { |
280 | struct lxc_list cgroup; | |
281 | struct lxc_list cgroup2; | |
bf651989 | 282 | struct bpf_program *cgroup2_devices; |
4bfb655e CB |
283 | /* This should be reimplemented as a hashmap. */ |
284 | struct lxc_list devices; | |
54860ed0 | 285 | }; |
edd64e17 | 286 | |
46ad64ab CB |
287 | struct { |
288 | struct lxc_list id_map; | |
c7e345ae | 289 | |
edd64e17 CB |
290 | /* |
291 | * Pointer to the idmap entry for the container's root uid in | |
292 | * the id_map list. Do not free! | |
293 | */ | |
5173b710 | 294 | const struct id_map *root_nsuid_map; |
c7e345ae | 295 | |
edd64e17 CB |
296 | /* |
297 | * Pointer to the idmap entry for the container's root gid in | |
298 | * the id_map list. Do not free! | |
299 | */ | |
5173b710 | 300 | const struct id_map *root_nsgid_map; |
46ad64ab | 301 | }; |
edd64e17 | 302 | |
5f4535a3 | 303 | struct lxc_list network; |
448d7b0c CB |
304 | |
305 | struct { | |
306 | char *fstab; | |
307 | int auto_mounts; | |
308 | struct lxc_list mount_list; | |
309 | }; | |
310 | ||
81810dd1 | 311 | struct lxc_list caps; |
1fb86a7c | 312 | struct lxc_list keepcaps; |
885766f5 | 313 | |
a2db71c0 | 314 | /* /dev/tty<idx> devices */ |
885766f5 | 315 | struct lxc_tty_info ttys; |
a2db71c0 CB |
316 | /* /dev/console device */ |
317 | struct lxc_terminal console; | |
318 | /* maximum pty devices allowed by devpts mount */ | |
e528c735 | 319 | size_t pty_max; |
f797f05e CB |
320 | /* file descriptor for the container's /dev/pts mount */ |
321 | int devpts_fd; | |
885766f5 | 322 | |
32fd6cf3 CB |
323 | /* set to true when rootfs has been setup */ |
324 | bool rootfs_setup; | |
33fcb7a0 | 325 | struct lxc_rootfs rootfs; |
32fd6cf3 | 326 | |
b3187a81 | 327 | bool close_all_fds; |
44ae0fb6 CB |
328 | |
329 | struct { | |
330 | unsigned int hooks_version; | |
331 | struct lxc_list hooks[NUM_LXC_HOOKS]; | |
332 | }; | |
4a85ce2a | 333 | |
fe4de9a6 | 334 | char *lsm_aa_profile; |
1800f924 WB |
335 | char *lsm_aa_profile_computed; |
336 | bool lsm_aa_profile_created; | |
337 | unsigned int lsm_aa_allow_nesting; | |
a56e2df9 | 338 | unsigned int lsm_aa_allow_incomplete; |
1800f924 | 339 | struct lxc_list lsm_aa_raw; |
fe4de9a6 | 340 | char *lsm_se_context; |
4fef78bc | 341 | char *lsm_se_keyring_context; |
8f818a84 | 342 | bool keyring_disable_session; |
7a0bcca3 | 343 | bool tmp_umount_proc; |
c3e3c21a | 344 | struct lxc_seccomp seccomp; |
72d0e1cb | 345 | int maincmd_fd; |
1a0e70ac | 346 | unsigned int autodev; /* if 1, mount and fill a /dev at start */ |
63012bdd | 347 | int autodevtmpfssize; /* size of the /dev tmpfs */ |
1a0e70ac CB |
348 | int haltsignal; /* signal used to halt container */ |
349 | int rebootsignal; /* signal used to reboot container */ | |
350 | int stopsignal; /* signal used to hard stop container */ | |
351 | char *rcfile; /* Copy of the top level rcfile we read */ | |
352 | ||
b9949538 | 353 | /* Logfile and loglevel can be set in a container config file. Those |
7b660465 | 354 | * function as defaults. The defaults can be overridden by command line. |
1a0e70ac CB |
355 | * However we don't want the command line specified values to be saved |
356 | * on c->save_config(). So we store the config file specified values | |
357 | * here. */ | |
98020c31 JS |
358 | char *logfile; /* the logfile as specified in config */ |
359 | int loglevel; /* loglevel as specified in config (if any) */ | |
858377e4 | 360 | int logfd; |
9f30a190 | 361 | |
3590152f CB |
362 | unsigned int start_auto; |
363 | unsigned int start_delay; | |
ee1e7aa0 SG |
364 | int start_order; |
365 | struct lxc_list groups; | |
76a26f55 | 366 | int nbd_idx; |
35120d9c | 367 | |
a8dfe4e0 | 368 | /* unshare the mount namespace in the monitor */ |
226dc30e | 369 | unsigned int monitor_unshare; |
258f8051 | 370 | unsigned int monitor_signal_pdeath; |
a8dfe4e0 | 371 | |
f979ac15 SH |
372 | /* list of included files */ |
373 | struct lxc_list includes; | |
4184c3e1 SH |
374 | /* config entries which are not "lxc.*" are aliens */ |
375 | struct lxc_list aliens; | |
7c661726 MP |
376 | |
377 | /* list of environment variables we'll add to the container when | |
378 | * started */ | |
379 | struct lxc_list environment; | |
6b0d5538 SH |
380 | |
381 | /* text representation of the config file */ | |
382 | char *unexpanded_config; | |
32fd6cf3 CB |
383 | size_t unexpanded_len; |
384 | size_t unexpanded_alloced; | |
67c660d0 | 385 | |
5cda27c1 SH |
386 | /* default command for lxc-execute */ |
387 | char *execute_cmd; | |
388 | ||
67c660d0 SG |
389 | /* init command */ |
390 | char *init_cmd; | |
56f8ff00 | 391 | |
72bb04e4 PT |
392 | /* if running in a new user namespace, the UID/GID that init and COMMAND |
393 | * should run under when using lxc-execute */ | |
c5cd20ce PT |
394 | uid_t init_uid; |
395 | gid_t init_gid; | |
8796becf CB |
396 | |
397 | /* indicator if the container will be destroyed on shutdown */ | |
66ffdb1a | 398 | unsigned int ephemeral; |
76d0127f CB |
399 | |
400 | /* The facility to pass to syslog. Let's users establish as what type of | |
401 | * program liblxc is supposed to write to the syslog. */ | |
402 | char *syslog; | |
5a46f283 CB |
403 | |
404 | /* Whether PR_SET_NO_NEW_PRIVS will be set for the container. */ | |
405 | bool no_new_privs; | |
c6d09e15 WB |
406 | |
407 | /* RLIMIT_* limits */ | |
408 | struct lxc_list limits; | |
7ec2e32a | 409 | |
43654d34 CB |
410 | /* Contains generic info about the cgroup configuration for this |
411 | * container. Note that struct lxc_cgroup contains a union. It is only | |
412 | * valid to access the members of the anonymous "meta" struct within | |
413 | * that union. | |
414 | */ | |
415 | struct lxc_cgroup cgroup_meta; | |
28d9e29e | 416 | |
b074bbf1 | 417 | struct { |
1d8d3676 | 418 | int ns_clone; |
abeb5bba | 419 | int ns_keep; |
b074bbf1 CB |
420 | char *ns_share[LXC_NS_MAX]; |
421 | }; | |
3c491553 L |
422 | |
423 | /* init working directory */ | |
9e132956 | 424 | char *init_cwd; |
3c491553 | 425 | |
d39b10eb CB |
426 | /* A list of clients registered to be informed about a container state. */ |
427 | struct lxc_list state_clients; | |
7edd0540 L |
428 | |
429 | /* sysctls */ | |
430 | struct lxc_list sysctls; | |
61d7a733 YT |
431 | |
432 | /* procs */ | |
433 | struct lxc_list procs; | |
adf0ba1f | 434 | |
7a41e857 | 435 | struct shmount { |
adf0ba1f LT |
436 | /* Absolute path to the shared mount point on the host */ |
437 | char *path_host; | |
438 | /* Absolute path (in the container) to the shared mount point */ | |
439 | char *path_cont; | |
7a41e857 | 440 | } shmount; |
70fd7fc9 CB |
441 | |
442 | struct timens_offsets timens; | |
571e6ec8 DL |
443 | }; |
444 | ||
efb7e304 CB |
445 | __hidden extern int write_id_mapping(enum idtype idtype, pid_t pid, const char *buf, size_t buf_size) |
446 | __access_r(3, 4); | |
344c9d81 | 447 | |
858377e4 | 448 | #ifdef HAVE_TLS |
d7f19646 | 449 | extern thread_local struct lxc_conf *current_config; |
858377e4 SH |
450 | #else |
451 | extern struct lxc_conf *current_config; | |
452 | #endif | |
453 | ||
efb7e304 CB |
454 | __hidden extern int run_lxc_hooks(const char *name, char *hook, struct lxc_conf *conf, char *argv[]); |
455 | __hidden extern struct lxc_conf *lxc_conf_init(void); | |
456 | __hidden extern void lxc_conf_free(struct lxc_conf *conf); | |
457 | __hidden extern int pin_rootfs(const char *rootfs); | |
458 | __hidden extern int lxc_map_ids(struct lxc_list *idmap, pid_t pid); | |
459 | __hidden extern int lxc_create_tty(const char *name, struct lxc_conf *conf); | |
460 | __hidden extern void lxc_delete_tty(struct lxc_tty_info *ttys); | |
461 | __hidden extern int lxc_clear_config_caps(struct lxc_conf *c); | |
462 | __hidden extern int lxc_clear_config_keepcaps(struct lxc_conf *c); | |
463 | __hidden extern int lxc_clear_cgroups(struct lxc_conf *c, const char *key, int version); | |
464 | __hidden extern int lxc_clear_mount_entries(struct lxc_conf *c); | |
465 | __hidden extern int lxc_clear_automounts(struct lxc_conf *c); | |
466 | __hidden extern int lxc_clear_hooks(struct lxc_conf *c, const char *key); | |
467 | __hidden extern int lxc_clear_idmaps(struct lxc_conf *c); | |
468 | __hidden extern int lxc_clear_groups(struct lxc_conf *c); | |
469 | __hidden extern int lxc_clear_environment(struct lxc_conf *c); | |
470 | __hidden extern int lxc_clear_limits(struct lxc_conf *c, const char *key); | |
471 | __hidden extern int lxc_delete_autodev(struct lxc_handler *handler); | |
472 | __hidden extern int lxc_clear_autodev_tmpfs_size(struct lxc_conf *c); | |
473 | __hidden extern void lxc_clear_includes(struct lxc_conf *conf); | |
474 | __hidden extern int lxc_setup_rootfs_prepare_root(struct lxc_conf *conf, const char *name, | |
475 | const char *lxcpath); | |
476 | __hidden extern int lxc_setup(struct lxc_handler *handler); | |
477 | __hidden extern int lxc_setup_parent(struct lxc_handler *handler); | |
478 | __hidden extern int setup_resource_limits(struct lxc_list *limits, pid_t pid); | |
479 | __hidden extern int find_unmapped_nsid(const struct lxc_conf *conf, enum idtype idtype); | |
480 | __hidden extern int mapped_hostid(unsigned id, const struct lxc_conf *conf, enum idtype idtype); | |
481 | __hidden extern int userns_exec_1(const struct lxc_conf *conf, int (*fn)(void *), void *data, | |
482 | const char *fn_name); | |
483 | __hidden extern int userns_exec_full(struct lxc_conf *conf, int (*fn)(void *), void *data, | |
484 | const char *fn_name); | |
485 | __hidden extern int parse_mntopts(const char *mntopts, unsigned long *mntflags, char **mntdata); | |
486 | __hidden extern int parse_propagationopts(const char *mntopts, unsigned long *pflags); | |
487 | __hidden extern void tmp_proc_unmount(struct lxc_conf *lxc_conf); | |
488 | __hidden extern void turn_into_dependent_mounts(void); | |
489 | __hidden extern void suggest_default_idmap(void); | |
490 | __hidden extern FILE *make_anonymous_mount_file(struct lxc_list *mount, bool include_nesting_helpers); | |
491 | __hidden extern struct lxc_list *sort_cgroup_settings(struct lxc_list *cgroup_settings); | |
492 | __hidden extern unsigned long add_required_remount_flags(const char *s, const char *d, | |
493 | unsigned long flags); | |
494 | __hidden extern int run_script(const char *name, const char *section, const char *script, ...); | |
495 | __hidden extern int run_script_argv(const char *name, unsigned int hook_version, const char *section, | |
496 | const char *script, const char *hookname, char **argsin); | |
497 | __hidden extern int in_caplist(int cap, struct lxc_list *caps); | |
498 | __hidden extern int setup_sysctl_parameters(struct lxc_list *sysctls); | |
499 | __hidden extern int lxc_clear_sysctls(struct lxc_conf *c, const char *key); | |
500 | __hidden extern int setup_proc_filesystem(struct lxc_list *procs, pid_t pid); | |
501 | __hidden extern int lxc_clear_procs(struct lxc_conf *c, const char *key); | |
502 | __hidden extern int lxc_clear_apparmor_raw(struct lxc_conf *c); | |
503 | __hidden extern int lxc_clear_namespace(struct lxc_conf *c); | |
504 | __hidden extern int userns_exec_minimal(const struct lxc_conf *conf, int (*fn_parent)(void *), | |
505 | void *fn_parent_data, int (*fn_child)(void *), | |
506 | void *fn_child_data); | |
507 | __hidden extern int userns_exec_mapped_root(const char *path, int path_fd, | |
508 | const struct lxc_conf *conf); | |
6e1a327a CB |
509 | static inline int chown_mapped_root(const char *path, const struct lxc_conf *conf) |
510 | { | |
511 | return userns_exec_mapped_root(path, -EBADF, conf); | |
512 | } | |
5ae72b98 | 513 | |
68f3899e CB |
514 | __hidden int lxc_setup_devpts_parent(struct lxc_handler *handler); |
515 | ||
1a0e70ac | 516 | #endif /* __LXC_CONF_H */ |