]> git.proxmox.com Git - mirror_lxc.git/blob - src/lxc/confile.c
conf: port environment to new list type
[mirror_lxc.git] / src / lxc / confile.c
1 /* SPDX-License-Identifier: LGPL-2.1+ */
2
3 #ifndef _GNU_SOURCE
4 #define _GNU_SOURCE 1
5 #endif
6 #define __STDC_FORMAT_MACROS
7 #include <arpa/inet.h>
8 #include <ctype.h>
9 #include <dirent.h>
10 #include <errno.h>
11 #include <fcntl.h>
12 #include <inttypes.h>
13 #include <net/if.h>
14 #include <netinet/in.h>
15 #include <signal.h>
16 #include <stdio.h>
17 #include <stdlib.h>
18 #include <string.h>
19 #include <sys/param.h>
20 #include <sys/stat.h>
21 #include <sys/types.h>
22 #include <sys/utsname.h>
23 #include <syslog.h>
24 #include <time.h>
25 #include <unistd.h>
26
27 #include "af_unix.h"
28 #include "conf.h"
29 #include "config.h"
30 #include "confile.h"
31 #include "confile_utils.h"
32 #include "../include/netns_ifaddrs.h"
33 #include "log.h"
34 #include "lxcseccomp.h"
35 #include "macro.h"
36 #include "memory_utils.h"
37 #include "network.h"
38 #include "parse.h"
39 #include "storage/storage.h"
40 #include "utils.h"
41
42 #ifndef HAVE_STRLCPY
43 #include "include/strlcpy.h"
44 #endif
45
46 #ifndef HAVE_STRLCAT
47 #include "include/strlcat.h"
48 #endif
49
50 lxc_log_define(confile, lxc);
51
52 #define lxc_config_define(name) \
53 __hot static int set_config_##name(const char *, const char *, \
54 struct lxc_conf *, void *); \
55 __hot static int get_config_##name(const char *, char *, int, \
56 struct lxc_conf *, void *); \
57 __hot static int clr_config_##name(const char *, struct lxc_conf *, \
58 void *);
59
60 lxc_config_define(autodev);
61 lxc_config_define(autodev_tmpfs_size);
62 lxc_config_define(apparmor_allow_incomplete);
63 lxc_config_define(apparmor_allow_nesting);
64 lxc_config_define(apparmor_profile);
65 lxc_config_define(apparmor_raw);
66 lxc_config_define(cap_drop);
67 lxc_config_define(cap_keep);
68 lxc_config_define(cgroup_controller);
69 lxc_config_define(cgroup2_controller);
70 lxc_config_define(cgroup_dir);
71 lxc_config_define(cgroup_monitor_dir);
72 lxc_config_define(cgroup_monitor_pivot_dir);
73 lxc_config_define(cgroup_container_dir);
74 lxc_config_define(cgroup_container_inner_dir);
75 lxc_config_define(cgroup_relative);
76 lxc_config_define(console_buffer_size);
77 lxc_config_define(console_logfile);
78 lxc_config_define(console_path);
79 lxc_config_define(console_rotate);
80 lxc_config_define(console_size);
81 lxc_config_define(unsupported_key);
82 lxc_config_define(environment);
83 lxc_config_define(ephemeral);
84 lxc_config_define(execute_cmd);
85 lxc_config_define(group);
86 lxc_config_define(hooks);
87 lxc_config_define(hooks_version);
88 lxc_config_define(idmaps);
89 lxc_config_define(includefiles);
90 lxc_config_define(init_cmd);
91 lxc_config_define(init_cwd);
92 lxc_config_define(init_gid);
93 lxc_config_define(init_uid);
94 lxc_config_define(init_groups);
95 lxc_config_define(jump_table_net);
96 lxc_config_define(keyring_session);
97 lxc_config_define(log_file);
98 lxc_config_define(log_level);
99 lxc_config_define(log_syslog);
100 lxc_config_define(monitor);
101 lxc_config_define(monitor_signal_pdeath);
102 lxc_config_define(mount);
103 lxc_config_define(mount_auto);
104 lxc_config_define(mount_fstab);
105 lxc_config_define(namespace_clone);
106 lxc_config_define(namespace_keep);
107 lxc_config_define(time_offset_boot);
108 lxc_config_define(time_offset_monotonic);
109 lxc_config_define(namespace_share);
110 lxc_config_define(net);
111 lxc_config_define(net_flags);
112 lxc_config_define(net_hwaddr);
113 lxc_config_define(net_ipv4_address);
114 lxc_config_define(net_ipv4_gateway);
115 lxc_config_define(net_ipv6_address);
116 lxc_config_define(net_ipv6_gateway);
117 lxc_config_define(net_link);
118 lxc_config_define(net_l2proxy);
119 lxc_config_define(net_macvlan_mode);
120 lxc_config_define(net_ipvlan_mode);
121 lxc_config_define(net_ipvlan_isolation);
122 lxc_config_define(net_mtu);
123 lxc_config_define(net_name);
124 lxc_config_define(net_script_down);
125 lxc_config_define(net_script_up);
126 lxc_config_define(net_type);
127 lxc_config_define(net_veth_mode);
128 lxc_config_define(net_veth_pair);
129 lxc_config_define(net_veth_ipv4_route);
130 lxc_config_define(net_veth_ipv6_route);
131 lxc_config_define(net_veth_vlan_id);
132 lxc_config_define(net_veth_vlan_tagged_id);
133 lxc_config_define(net_vlan_id);
134 lxc_config_define(no_new_privs);
135 lxc_config_define(personality);
136 lxc_config_define(prlimit);
137 lxc_config_define(pty_max);
138 lxc_config_define(rootfs_managed);
139 lxc_config_define(rootfs_mount);
140 lxc_config_define(rootfs_options);
141 lxc_config_define(rootfs_path);
142 lxc_config_define(seccomp_profile);
143 lxc_config_define(seccomp_allow_nesting);
144 lxc_config_define(seccomp_notify_cookie);
145 lxc_config_define(seccomp_notify_proxy);
146 lxc_config_define(selinux_context);
147 lxc_config_define(selinux_context_keyring);
148 lxc_config_define(signal_halt);
149 lxc_config_define(signal_reboot);
150 lxc_config_define(signal_stop);
151 lxc_config_define(start);
152 lxc_config_define(tty_max);
153 lxc_config_define(tty_dir);
154 lxc_config_define(uts_name);
155 lxc_config_define(sysctl);
156 lxc_config_define(proc);
157
158 static int set_config_unsupported_key(const char *key, const char *value,
159 struct lxc_conf *lxc_conf, void *data)
160 {
161 return syserror_set(-EINVAL, "Unsupported config key \"%s\"", key);
162 }
163
164 static int get_config_unsupported_key(const char *key, char *retv, int inlen,
165 struct lxc_conf *c, void *data)
166 {
167 return syserror_set(-EINVAL, "Unsupported config key \"%s\"", key);
168 }
169
170 static int clr_config_unsupported_key(const char *key,
171 struct lxc_conf *lxc_conf, void *data)
172 {
173 return syserror_set(-EINVAL, "Unsupported config key \"%s\"", key);
174 }
175
176 /*
177 * Important Note:
178 * If a new config option is added to this table, be aware that
179 * the order in which the options are places into the table matters.
180 * That means that more specific options of a namespace have to be
181 * placed above more generic ones.
182 *
183 * For instance: If lxc.ab is placed before lxc.ab.c, the config option
184 * lxc.ab.c will always be matched to lxc.ab. That is, the lxc.ab.c option
185 * has to be placed above lxc.ab.
186 */
187 static struct lxc_config_t config_jump_table[] = {
188 { "lxc.arch", true, set_config_personality, get_config_personality, clr_config_personality, },
189 { "lxc.apparmor.profile", true, set_config_apparmor_profile, get_config_apparmor_profile, clr_config_apparmor_profile, },
190 { "lxc.apparmor.allow_incomplete", true, set_config_apparmor_allow_incomplete, get_config_apparmor_allow_incomplete, clr_config_apparmor_allow_incomplete, },
191 { "lxc.apparmor.allow_nesting", true, set_config_apparmor_allow_nesting, get_config_apparmor_allow_nesting, clr_config_apparmor_allow_nesting, },
192 { "lxc.apparmor.raw", true, set_config_apparmor_raw, get_config_apparmor_raw, clr_config_apparmor_raw, },
193 { "lxc.autodev.tmpfs.size", true, set_config_autodev_tmpfs_size, get_config_autodev_tmpfs_size, clr_config_autodev_tmpfs_size, },
194 { "lxc.autodev", true, set_config_autodev, get_config_autodev, clr_config_autodev, },
195 { "lxc.cap.drop", true, set_config_cap_drop, get_config_cap_drop, clr_config_cap_drop, },
196 { "lxc.cap.keep", true, set_config_cap_keep, get_config_cap_keep, clr_config_cap_keep, },
197 { "lxc.cgroup2", false, set_config_cgroup2_controller, get_config_cgroup2_controller, clr_config_cgroup2_controller, },
198 { "lxc.cgroup.dir.monitor.pivot", true, set_config_cgroup_monitor_pivot_dir, get_config_cgroup_monitor_pivot_dir, clr_config_cgroup_monitor_pivot_dir, },
199 { "lxc.cgroup.dir.monitor", true, set_config_cgroup_monitor_dir, get_config_cgroup_monitor_dir, clr_config_cgroup_monitor_dir, },
200 { "lxc.cgroup.dir.container.inner", true, set_config_cgroup_container_inner_dir, get_config_cgroup_container_inner_dir, clr_config_cgroup_container_inner_dir, },
201 { "lxc.cgroup.dir.container", true, set_config_cgroup_container_dir, get_config_cgroup_container_dir, clr_config_cgroup_container_dir, },
202 { "lxc.cgroup.dir", true, set_config_cgroup_dir, get_config_cgroup_dir, clr_config_cgroup_dir, },
203 { "lxc.cgroup.relative", true, set_config_cgroup_relative, get_config_cgroup_relative, clr_config_cgroup_relative, },
204 { "lxc.cgroup", false, set_config_cgroup_controller, get_config_cgroup_controller, clr_config_cgroup_controller, },
205 { "lxc.console.buffer.size", true, set_config_console_buffer_size, get_config_console_buffer_size, clr_config_console_buffer_size, },
206 { "lxc.console.logfile", true, set_config_console_logfile, get_config_console_logfile, clr_config_console_logfile, },
207 { "lxc.console.path", true, set_config_console_path, get_config_console_path, clr_config_console_path, },
208 { "lxc.console.rotate", true, set_config_console_rotate, get_config_console_rotate, clr_config_console_rotate, },
209 { "lxc.console.size", true, set_config_console_size, get_config_console_size, clr_config_console_size, },
210 { "lxc.environment", true, set_config_environment, get_config_environment, clr_config_environment, },
211 { "lxc.ephemeral", true, set_config_ephemeral, get_config_ephemeral, clr_config_ephemeral, },
212 { "lxc.execute.cmd", true, set_config_execute_cmd, get_config_execute_cmd, clr_config_execute_cmd, },
213 { "lxc.group", true, set_config_group, get_config_group, clr_config_group, },
214 { "lxc.hook.autodev", true, set_config_hooks, get_config_hooks, clr_config_hooks, },
215 { "lxc.hook.clone", true, set_config_hooks, get_config_hooks, clr_config_hooks, },
216 { "lxc.hook.destroy", true, set_config_hooks, get_config_hooks, clr_config_hooks, },
217 { "lxc.hook.mount", true, set_config_hooks, get_config_hooks, clr_config_hooks, },
218 { "lxc.hook.post-stop", true, set_config_hooks, get_config_hooks, clr_config_hooks, },
219 { "lxc.hook.pre-mount", true, set_config_hooks, get_config_hooks, clr_config_hooks, },
220 { "lxc.hook.pre-start", true, set_config_hooks, get_config_hooks, clr_config_hooks, },
221 { "lxc.hook.start", true, set_config_hooks, get_config_hooks, clr_config_hooks, },
222 { "lxc.hook.start-host", true, set_config_hooks, get_config_hooks, clr_config_hooks, },
223 { "lxc.hook.stop", true, set_config_hooks, get_config_hooks, clr_config_hooks, },
224 { "lxc.hook.version", true, set_config_hooks_version, get_config_hooks_version, clr_config_hooks_version, },
225 { "lxc.hook", true, set_config_hooks, get_config_hooks, clr_config_hooks, },
226 { "lxc.idmap", true, set_config_idmaps, get_config_idmaps, clr_config_idmaps, },
227 { "lxc.include", true, set_config_includefiles, get_config_includefiles, clr_config_includefiles, },
228 { "lxc.init.cmd", true, set_config_init_cmd, get_config_init_cmd, clr_config_init_cmd, },
229 { "lxc.init.gid", true, set_config_init_gid, get_config_init_gid, clr_config_init_gid, },
230 { "lxc.init.groups", true, set_config_init_groups, get_config_init_groups, clr_config_init_groups, },
231 { "lxc.init.uid", true, set_config_init_uid, get_config_init_uid, clr_config_init_uid, },
232 { "lxc.init.cwd", true, set_config_init_cwd, get_config_init_cwd, clr_config_init_cwd, },
233 { "lxc.keyring.session", true, set_config_keyring_session, get_config_keyring_session, clr_config_keyring_session },
234 { "lxc.log.file", true, set_config_log_file, get_config_log_file, clr_config_log_file, },
235 { "lxc.log.level", true, set_config_log_level, get_config_log_level, clr_config_log_level, },
236 { "lxc.log.syslog", true, set_config_log_syslog, get_config_log_syslog, clr_config_log_syslog, },
237 { "lxc.monitor.unshare", true, set_config_monitor, get_config_monitor, clr_config_monitor, },
238 { "lxc.monitor.signal.pdeath", true, set_config_monitor_signal_pdeath, get_config_monitor_signal_pdeath, clr_config_monitor_signal_pdeath, },
239 { "lxc.mount.auto", true, set_config_mount_auto, get_config_mount_auto, clr_config_mount_auto, },
240 { "lxc.mount.entry", true, set_config_mount, get_config_mount, clr_config_mount, },
241 { "lxc.mount.fstab", true, set_config_mount_fstab, get_config_mount_fstab, clr_config_mount_fstab, },
242 { "lxc.namespace.clone", true, set_config_namespace_clone, get_config_namespace_clone, clr_config_namespace_clone, },
243 { "lxc.namespace.keep", true, set_config_namespace_keep, get_config_namespace_keep, clr_config_namespace_keep, },
244 { "lxc.namespace.share.", false, set_config_namespace_share, get_config_namespace_share, clr_config_namespace_share, },
245 { "lxc.time.offset.boot", true, set_config_time_offset_boot, get_config_time_offset_boot, clr_config_time_offset_boot, },
246 { "lxc.time.offset.monotonic", true, set_config_time_offset_monotonic, get_config_time_offset_monotonic, clr_config_time_offset_monotonic, },
247 { "lxc.net.", false, set_config_jump_table_net, get_config_jump_table_net, clr_config_jump_table_net, },
248 { "lxc.net", true, set_config_net, get_config_net, clr_config_net, },
249 { "lxc.no_new_privs", true, set_config_no_new_privs, get_config_no_new_privs, clr_config_no_new_privs, },
250 { "lxc.prlimit", false, set_config_prlimit, get_config_prlimit, clr_config_prlimit, },
251 { "lxc.pty.max", true, set_config_pty_max, get_config_pty_max, clr_config_pty_max, },
252 { "lxc.rootfs.managed", true, set_config_rootfs_managed, get_config_rootfs_managed, clr_config_rootfs_managed, },
253 { "lxc.rootfs.mount", true, set_config_rootfs_mount, get_config_rootfs_mount, clr_config_rootfs_mount, },
254 { "lxc.rootfs.options", true, set_config_rootfs_options, get_config_rootfs_options, clr_config_rootfs_options, },
255 { "lxc.rootfs.path", true, set_config_rootfs_path, get_config_rootfs_path, clr_config_rootfs_path, },
256 { "lxc.seccomp.allow_nesting", true, set_config_seccomp_allow_nesting, get_config_seccomp_allow_nesting, clr_config_seccomp_allow_nesting, },
257 { "lxc.seccomp.notify.cookie", true, set_config_seccomp_notify_cookie, get_config_seccomp_notify_cookie, clr_config_seccomp_notify_cookie, },
258 { "lxc.seccomp.notify.proxy", true, set_config_seccomp_notify_proxy, get_config_seccomp_notify_proxy, clr_config_seccomp_notify_proxy, },
259 { "lxc.seccomp.profile", true, set_config_seccomp_profile, get_config_seccomp_profile, clr_config_seccomp_profile, },
260 { "lxc.selinux.context.keyring", true, set_config_selinux_context_keyring, get_config_selinux_context_keyring, clr_config_selinux_context_keyring },
261 { "lxc.selinux.context", true, set_config_selinux_context, get_config_selinux_context, clr_config_selinux_context, },
262 { "lxc.signal.halt", true, set_config_signal_halt, get_config_signal_halt, clr_config_signal_halt, },
263 { "lxc.signal.reboot", true, set_config_signal_reboot, get_config_signal_reboot, clr_config_signal_reboot, },
264 { "lxc.signal.stop", true, set_config_signal_stop, get_config_signal_stop, clr_config_signal_stop, },
265 { "lxc.start.auto", true, set_config_start, get_config_start, clr_config_start, },
266 { "lxc.start.delay", true, set_config_start, get_config_start, clr_config_start, },
267 { "lxc.start.order", true, set_config_start, get_config_start, clr_config_start, },
268 { "lxc.tty.dir", true, set_config_tty_dir, get_config_tty_dir, clr_config_tty_dir, },
269 { "lxc.tty.max", true, set_config_tty_max, get_config_tty_max, clr_config_tty_max, },
270 { "lxc.uts.name", true, set_config_uts_name, get_config_uts_name, clr_config_uts_name, },
271 { "lxc.sysctl", false, set_config_sysctl, get_config_sysctl, clr_config_sysctl, },
272 { "lxc.proc", false, set_config_proc, get_config_proc, clr_config_proc, },
273 };
274
275 static struct lxc_config_t unsupported_config_key = {
276 NULL,
277 false,
278 set_config_unsupported_key,
279 get_config_unsupported_key,
280 clr_config_unsupported_key,
281 };
282
283 struct lxc_config_net_t {
284 LXC_CONFIG_MEMBERS;
285 };
286
287 static struct lxc_config_net_t config_jump_table_net[] = {
288 /* If a longer key is added please update. */
289 #define NETWORK_SUBKEY_SIZE_MAX (STRLITERALLEN("veth.vlan.tagged.id") * 2)
290 { "flags", true, set_config_net_flags, get_config_net_flags, clr_config_net_flags, },
291 { "hwaddr", true, set_config_net_hwaddr, get_config_net_hwaddr, clr_config_net_hwaddr, },
292 { "ipv4.address", true, set_config_net_ipv4_address, get_config_net_ipv4_address, clr_config_net_ipv4_address, },
293 { "ipv4.gateway", true, set_config_net_ipv4_gateway, get_config_net_ipv4_gateway, clr_config_net_ipv4_gateway, },
294 { "ipv6.address", true, set_config_net_ipv6_address, get_config_net_ipv6_address, clr_config_net_ipv6_address, },
295 { "ipv6.gateway", true, set_config_net_ipv6_gateway, get_config_net_ipv6_gateway, clr_config_net_ipv6_gateway, },
296 { "link", true, set_config_net_link, get_config_net_link, clr_config_net_link, },
297 { "l2proxy", true, set_config_net_l2proxy, get_config_net_l2proxy, clr_config_net_l2proxy, },
298 { "macvlan.mode", true, set_config_net_macvlan_mode, get_config_net_macvlan_mode, clr_config_net_macvlan_mode, },
299 { "ipvlan.mode", true, set_config_net_ipvlan_mode, get_config_net_ipvlan_mode, clr_config_net_ipvlan_mode, },
300 { "ipvlan.isolation", true, set_config_net_ipvlan_isolation, get_config_net_ipvlan_isolation, clr_config_net_ipvlan_isolation, },
301 { "mtu", true, set_config_net_mtu, get_config_net_mtu, clr_config_net_mtu, },
302 { "name", true, set_config_net_name, get_config_net_name, clr_config_net_name, },
303 { "script.down", true, set_config_net_script_down, get_config_net_script_down, clr_config_net_script_down, },
304 { "script.up", true, set_config_net_script_up, get_config_net_script_up, clr_config_net_script_up, },
305 { "type", true, set_config_net_type, get_config_net_type, clr_config_net_type, },
306 { "vlan.id", true, set_config_net_vlan_id, get_config_net_vlan_id, clr_config_net_vlan_id, },
307 { "veth.mode", true, set_config_net_veth_mode, get_config_net_veth_mode, clr_config_net_veth_mode, },
308 { "veth.pair", true, set_config_net_veth_pair, get_config_net_veth_pair, clr_config_net_veth_pair, },
309 { "veth.ipv4.route", true, set_config_net_veth_ipv4_route, get_config_net_veth_ipv4_route, clr_config_net_veth_ipv4_route, },
310 { "veth.ipv6.route", true, set_config_net_veth_ipv6_route, get_config_net_veth_ipv6_route, clr_config_net_veth_ipv6_route, },
311 { "veth.vlan.id", true, set_config_net_veth_vlan_id, get_config_net_veth_vlan_id, clr_config_net_veth_vlan_id, },
312 { "veth.vlan.tagged.id", true, set_config_net_veth_vlan_tagged_id, get_config_net_veth_vlan_tagged_id, clr_config_net_veth_vlan_tagged_id, },
313 };
314
315 static struct lxc_config_net_t unsupported_config_net_key = {
316 NULL,
317 false,
318 set_config_unsupported_key,
319 get_config_unsupported_key,
320 clr_config_unsupported_key,
321 };
322
323 struct lxc_config_t *lxc_get_config_exact(const char *key)
324 {
325 size_t i;
326
327 for (i = 0; i < ARRAY_SIZE(config_jump_table); i++)
328 if (strequal(config_jump_table[i].name, key))
329 return &config_jump_table[i];
330
331 return NULL;
332 }
333
334 /* Assume a reasonable subkey size limit. */
335 #define LXC_SUBKEY_LEN_MAX 256
336
337 static inline int match_config_item(const struct lxc_config_t *entry, const char *key)
338 {
339 size_t len;
340
341 if (entry->strict)
342 return strequal(entry->name, key);
343
344 /* There should be no subkey longer than this. */
345 len = strnlen(entry->name, LXC_SUBKEY_LEN_MAX);
346 if (len == LXC_SUBKEY_LEN_MAX)
347 return error_ret(-E2BIG, "Excessive subkey length");
348
349 return strnequal(entry->name, key, len);
350 }
351
352 struct lxc_config_t *lxc_get_config(const char *key)
353 {
354 for (size_t i = 0; i < ARRAY_SIZE(config_jump_table); i++) {
355 struct lxc_config_t *cur = &config_jump_table[i];
356
357 switch (match_config_item(cur, key)) {
358 case 0:
359 continue;
360 case -E2BIG:
361 return &unsupported_config_key;
362 }
363
364 return cur;
365 }
366
367 return &unsupported_config_key;
368 }
369
370 static inline bool match_config_net_item(const struct lxc_config_net_t *entry,
371 const char *key)
372 {
373 if (entry->strict)
374 return strequal(entry->name, key);
375 return strnequal(entry->name, key, strlen(entry->name));
376 }
377
378 static struct lxc_config_net_t *lxc_get_config_net(const char *key)
379 {
380 for (size_t i = 0; i < ARRAY_SIZE(config_jump_table_net); i++) {
381 struct lxc_config_net_t *cur = &config_jump_table_net[i];
382
383 if (!match_config_net_item(cur, key))
384 continue;
385
386 return cur;
387 }
388
389 return &unsupported_config_net_key;
390 }
391
392 static int set_config_net(const char *key, const char *value,
393 struct lxc_conf *lxc_conf, void *data)
394 {
395 if (!lxc_config_value_empty(value))
396 return syserror_set(-EINVAL, "lxc.net must not have a value");
397
398 return clr_config_net(key, lxc_conf, data);
399 }
400
401 static int set_config_net_type(const char *key, const char *value,
402 struct lxc_conf *lxc_conf, void *data)
403 {
404 struct lxc_netdev *netdev = data;
405
406 if (!netdev)
407 return ret_errno(EINVAL);
408
409 clr_config_net_type(key, lxc_conf, data);
410 if (lxc_config_value_empty(value))
411 return 0;
412
413 if (strequal(value, "veth")) {
414 netdev->type = LXC_NET_VETH;
415 lxc_list_init(&netdev->priv.veth_attr.ipv4_routes);
416 lxc_list_init(&netdev->priv.veth_attr.ipv6_routes);
417 lxc_list_init(&netdev->priv.veth_attr.vlan_tagged_ids);
418 if (!lxc_veth_flag_to_mode(netdev->priv.veth_attr.mode))
419 lxc_veth_mode_to_flag(&netdev->priv.veth_attr.mode, "bridge");
420 } else if (strequal(value, "macvlan")) {
421 netdev->type = LXC_NET_MACVLAN;
422 if (!lxc_macvlan_flag_to_mode(netdev->priv.veth_attr.mode))
423 lxc_macvlan_mode_to_flag(&netdev->priv.macvlan_attr.mode, "private");
424 } else if (strequal(value, "ipvlan")) {
425 netdev->type = LXC_NET_IPVLAN;
426 if (!lxc_ipvlan_flag_to_mode(netdev->priv.ipvlan_attr.mode))
427 lxc_ipvlan_mode_to_flag(&netdev->priv.ipvlan_attr.mode, "l3");
428 if (!lxc_ipvlan_flag_to_isolation(netdev->priv.ipvlan_attr.isolation))
429 lxc_ipvlan_isolation_to_flag(&netdev->priv.ipvlan_attr.isolation, "bridge");
430 } else if (strequal(value, "vlan")) {
431 netdev->type = LXC_NET_VLAN;
432 } else if (strequal(value, "phys")) {
433 netdev->type = LXC_NET_PHYS;
434 } else if (strequal(value, "empty")) {
435 netdev->type = LXC_NET_EMPTY;
436 /* We don't support custom loopback device names. */
437 (void)strlcpy(netdev->name, "lo", IFNAMSIZ);
438 } else if (strequal(value, "none")) {
439 netdev->type = LXC_NET_NONE;
440 } else {
441 return log_error(-1, "Invalid network type %s", value);
442 }
443
444 return 0;
445 }
446
447 static int set_config_net_flags(const char *key, const char *value,
448 struct lxc_conf *lxc_conf, void *data)
449 {
450 struct lxc_netdev *netdev = data;
451
452 if (!netdev)
453 return ret_errno(EINVAL);
454
455 if (lxc_config_value_empty(value))
456 return clr_config_net_flags(key, lxc_conf, data);
457
458 netdev->flags |= IFF_UP;
459
460 return 0;
461 }
462
463 static int create_matched_ifnames(const char *value, struct lxc_conf *lxc_conf,
464 struct lxc_netdev *netdev)
465 {
466 call_cleaner(netns_freeifaddrs) struct netns_ifaddrs *ifaddr = NULL;
467 struct netns_ifaddrs *ifa;
468 int n;
469 int ret = 0;
470 const char *type_key = "lxc.net.type";
471 const char *link_key = "lxc.net.link";
472 const char *tmpvalue = "phys";
473
474 if (netns_getifaddrs(&ifaddr, -1, &(bool){false}) < 0)
475 return log_error_errno(-1, errno, "Failed to get network interfaces");
476
477 for (ifa = ifaddr, n = 0; ifa != NULL; ifa = ifa->ifa_next, n++) {
478 if (!ifa->ifa_addr)
479 continue;
480
481 if (ifa->ifa_addr->sa_family != AF_PACKET)
482 continue;
483
484 if (strnequal(value, ifa->ifa_name, strlen(value) - 1)) {
485 ret = set_config_net_type(type_key, tmpvalue, lxc_conf,
486 netdev);
487 if (!ret) {
488 ret = set_config_net_link(
489 link_key, ifa->ifa_name, lxc_conf, netdev);
490 if (ret) {
491 ERROR("Failed to create matched ifnames");
492 break;
493 }
494 } else {
495 ERROR("Failed to create matched ifnames");
496 break;
497 }
498 }
499 }
500
501 return ret;
502 }
503
504 static int set_config_net_link(const char *key, const char *value,
505 struct lxc_conf *lxc_conf, void *data)
506 {
507 struct lxc_netdev *netdev = data;
508 int ret = 0;
509
510 if (!netdev)
511 return ret_errno(EINVAL);
512
513 if (lxc_config_value_empty(value))
514 return clr_config_net_link(key, lxc_conf, data);
515
516 if (value[strlen(value) - 1] == '+' && netdev->type == LXC_NET_PHYS)
517 ret = create_matched_ifnames(value, lxc_conf, netdev);
518 else
519 ret = network_ifname(netdev->link, value, sizeof(netdev->link));
520
521 return ret;
522 }
523
524 static int set_config_net_l2proxy(const char *key, const char *value,
525 struct lxc_conf *lxc_conf, void *data)
526 {
527 struct lxc_netdev *netdev = data;
528 unsigned int val = 0;
529 int ret;
530
531 if (!netdev)
532 return ret_errno(EINVAL);
533
534 if (lxc_config_value_empty(value))
535 return clr_config_net_l2proxy(key, lxc_conf, data);
536
537 ret = lxc_safe_uint(value, &val);
538 if (ret < 0)
539 return ret_errno(ret);
540
541 switch (val) {
542 case 0:
543 netdev->l2proxy = false;
544 return 0;
545 case 1:
546 netdev->l2proxy = true;
547 return 0;
548 }
549
550 return ret_errno(EINVAL);
551 }
552
553 static int set_config_net_name(const char *key, const char *value,
554 struct lxc_conf *lxc_conf, void *data)
555 {
556 struct lxc_netdev *netdev = data;
557
558 if (!netdev)
559 return ret_errno(EINVAL);
560
561 if (lxc_config_value_empty(value))
562 return clr_config_net_name(key, lxc_conf, data);
563
564 return network_ifname(netdev->name, value, sizeof(netdev->name));
565 }
566
567
568 static int set_config_net_veth_mode(const char *key, const char *value,
569 struct lxc_conf *lxc_conf, void *data)
570 {
571 struct lxc_netdev *netdev = data;
572
573 if (!netdev)
574 return ret_errno(EINVAL);
575
576 if (netdev->type != LXC_NET_VETH)
577 return ret_errno(EINVAL);
578
579 if (lxc_config_value_empty(value))
580 return clr_config_net_veth_mode(key, lxc_conf, data);
581
582 if (!netdev)
583 return ret_errno(EINVAL);
584
585 return lxc_veth_mode_to_flag(&netdev->priv.veth_attr.mode, value);
586 }
587
588 static int set_config_net_veth_pair(const char *key, const char *value,
589 struct lxc_conf *lxc_conf, void *data)
590 {
591 struct lxc_netdev *netdev = data;
592
593 if (!netdev)
594 return ret_errno(EINVAL);
595
596 if (netdev->type != LXC_NET_VETH)
597 return ret_errno(EINVAL);
598
599 if (lxc_config_value_empty(value))
600 return clr_config_net_veth_pair(key, lxc_conf, data);
601
602 return network_ifname(netdev->priv.veth_attr.pair, value,
603 sizeof(netdev->priv.veth_attr.pair));
604 }
605
606 static int set_config_net_veth_vlan_id(const char *key, const char *value,
607 struct lxc_conf *lxc_conf, void *data)
608 {
609 int ret;
610 struct lxc_netdev *netdev = data;
611
612 if (!netdev)
613 return ret_errno(EINVAL);
614
615 if (netdev->type != LXC_NET_VETH)
616 return ret_errno(EINVAL);
617
618 if (lxc_config_value_empty(value))
619 return clr_config_net_veth_vlan_id(key, lxc_conf, data);
620
621 if (strequal(value, "none")) {
622 netdev->priv.veth_attr.vlan_id = BRIDGE_VLAN_NONE;
623 } else {
624 unsigned short vlan_id;
625
626 ret = get_u16(&vlan_id, value, 0);
627 if (ret < 0)
628 return ret_errno(EINVAL);
629
630 if (vlan_id > BRIDGE_VLAN_ID_MAX)
631 return ret_errno(EINVAL);
632
633 netdev->priv.veth_attr.vlan_id = vlan_id;
634 }
635
636 netdev->priv.veth_attr.vlan_id_set = true;
637 return 0;
638 }
639
640 static int set_config_net_veth_vlan_tagged_id(const char *key, const char *value,
641 struct lxc_conf *lxc_conf,
642 void *data)
643 {
644 __do_free struct lxc_list *list = NULL;
645 int ret;
646 unsigned short vlan_id;
647 struct lxc_netdev *netdev = data;
648
649 if (!netdev)
650 return ret_errno(EINVAL);
651
652 if (netdev->type != LXC_NET_VETH)
653 return ret_errno(EINVAL);
654
655 if (lxc_config_value_empty(value))
656 return clr_config_net_veth_vlan_tagged_id(key, lxc_conf, data);
657
658 ret = get_u16(&vlan_id, value, 0);
659 if (ret < 0)
660 return ret_errno(EINVAL);
661
662 if (vlan_id > BRIDGE_VLAN_ID_MAX)
663 return ret_errno(EINVAL);
664
665 list = lxc_list_new();
666 if (!list)
667 return ret_errno(ENOMEM);
668
669 list->elem = UINT_TO_PTR(vlan_id);
670
671 lxc_list_add_tail(&netdev->priv.veth_attr.vlan_tagged_ids, move_ptr(list));
672
673 return 0;
674 }
675
676 static int set_config_net_macvlan_mode(const char *key, const char *value,
677 struct lxc_conf *lxc_conf, void *data)
678 {
679 struct lxc_netdev *netdev = data;
680
681 if (!netdev)
682 return ret_errno(EINVAL);
683
684 if (netdev->type != LXC_NET_MACVLAN)
685 return ret_errno(EINVAL);
686
687 if (lxc_config_value_empty(value))
688 return clr_config_net_macvlan_mode(key, lxc_conf, data);
689
690 return lxc_macvlan_mode_to_flag(&netdev->priv.macvlan_attr.mode, value);
691 }
692
693 static int set_config_net_ipvlan_mode(const char *key, const char *value,
694 struct lxc_conf *lxc_conf, void *data)
695 {
696 struct lxc_netdev *netdev = data;
697
698 if (!netdev)
699 return ret_errno(EINVAL);
700
701 if (netdev->type != LXC_NET_IPVLAN)
702 return syserror_set(-EINVAL, "Invalid ipvlan mode \"%s\", can only be used with ipvlan network", value);
703
704 if (lxc_config_value_empty(value))
705 return clr_config_net_ipvlan_mode(key, lxc_conf, data);
706
707 return lxc_ipvlan_mode_to_flag(&netdev->priv.ipvlan_attr.mode, value);
708 }
709
710 static int set_config_net_ipvlan_isolation(const char *key, const char *value,
711 struct lxc_conf *lxc_conf, void *data)
712 {
713 struct lxc_netdev *netdev = data;
714
715 if (!netdev)
716 return ret_errno(EINVAL);
717
718 if (netdev->type != LXC_NET_IPVLAN)
719 return syserror_set(-EINVAL, "Invalid ipvlan isolation \"%s\", can only be used with ipvlan network", value);
720
721 if (lxc_config_value_empty(value))
722 return clr_config_net_ipvlan_isolation(key, lxc_conf, data);
723
724 return lxc_ipvlan_isolation_to_flag(&netdev->priv.ipvlan_attr.isolation, value);
725 }
726
727 static int set_config_net_hwaddr(const char *key, const char *value,
728 struct lxc_conf *lxc_conf, void *data)
729 {
730 __do_free char *new_value = NULL;
731 struct lxc_netdev *netdev = data;
732
733 if (!netdev)
734 return ret_errno(EINVAL);
735
736 clr_config_net_hwaddr(key, lxc_conf, data);
737 if (lxc_config_value_empty(value))
738 return 0;
739
740 new_value = strdup(value);
741 if (!new_value)
742 return ret_errno(ENOMEM);
743
744 rand_complete_hwaddr(new_value);
745 if (!lxc_config_value_empty(new_value))
746 netdev->hwaddr = move_ptr(new_value);
747
748 return 0;
749 }
750
751 static int set_config_net_vlan_id(const char *key, const char *value,
752 struct lxc_conf *lxc_conf, void *data)
753 {
754 int ret;
755 struct lxc_netdev *netdev = data;
756
757 if (!netdev)
758 return ret_errno(EINVAL);
759
760 if (netdev->type != LXC_NET_VLAN)
761 return ret_errno(EINVAL);
762
763 if (lxc_config_value_empty(value))
764 return clr_config_net_vlan_id(key, lxc_conf, data);
765
766 ret = get_u16(&netdev->priv.vlan_attr.vid, value, 0);
767 if (ret < 0)
768 return ret;
769
770 return 0;
771 }
772
773 static int set_config_net_mtu(const char *key, const char *value,
774 struct lxc_conf *lxc_conf, void *data)
775 {
776 struct lxc_netdev *netdev = data;
777
778 if (!netdev)
779 return ret_errno(EINVAL);
780
781 clr_config_net_mtu(key, lxc_conf, data);
782 if (lxc_config_value_empty(value))
783 return 0;
784
785 return set_config_string_item(&netdev->mtu, value);
786 }
787
788 static int set_config_net_ipv4_address(const char *key, const char *value,
789 struct lxc_conf *lxc_conf, void *data)
790 {
791 __do_free char *addr = NULL;
792 __do_free struct lxc_inetdev *inetdev = NULL;
793 __do_free struct lxc_list *list = NULL;
794 int ret;
795 struct lxc_netdev *netdev = data;
796 char *cursor, *slash;
797 char *bcast = NULL, *prefix = NULL;
798
799 if (!netdev)
800 return ret_errno(EINVAL);
801
802 if (lxc_config_value_empty(value))
803 return clr_config_net_ipv4_address(key, lxc_conf, data);
804
805 inetdev = zalloc(sizeof(*inetdev));
806 if (!inetdev)
807 return ret_errno(ENOMEM);
808
809 list = lxc_list_new();
810 if (!list)
811 return ret_errno(ENOMEM);
812
813 addr = strdup(value);
814 if (!addr)
815 return ret_errno(ENOMEM);
816
817 cursor = strstr(addr, " ");
818 if (cursor) {
819 *cursor = '\0';
820 bcast = cursor + 1;
821 }
822
823 slash = strstr(addr, "/");
824 if (slash) {
825 *slash = '\0';
826 prefix = slash + 1;
827 }
828
829 ret = inet_pton(AF_INET, addr, &inetdev->addr);
830 if (!ret || ret < 0)
831 return log_error_errno(-1, errno, "Invalid ipv4 address \"%s\"", value);
832
833 if (bcast) {
834 ret = inet_pton(AF_INET, bcast, &inetdev->bcast);
835 if (!ret || ret < 0)
836 return log_error_errno(-1, errno, "Invalid ipv4 broadcast address \"%s\"", value);
837
838 }
839
840 /* No prefix specified, determine it from the network class. */
841 ret = 0;
842 if (prefix)
843 ret = lxc_safe_uint(prefix, &inetdev->prefix);
844 else
845 inetdev->prefix = config_ip_prefix(&inetdev->addr);
846 if (ret || inetdev->prefix > 32)
847 return ret_errno(EINVAL);
848
849 /* If no broadcast address, compute one from the prefix and address. */
850 if (!bcast) {
851 unsigned int shift = LAST_BIT_PER_TYPE(inetdev->prefix);
852
853 inetdev->bcast.s_addr = inetdev->addr.s_addr;
854 if (inetdev->prefix < shift)
855 shift = inetdev->prefix;
856 inetdev->bcast.s_addr |= htonl(INADDR_BROADCAST >> shift);
857 }
858
859 list->elem = inetdev;
860 lxc_list_add_tail(&netdev->ipv4, list);
861 move_ptr(inetdev);
862 move_ptr(list);
863
864 return 0;
865 }
866
867 static int set_config_net_ipv4_gateway(const char *key, const char *value,
868 struct lxc_conf *lxc_conf, void *data)
869 {
870 struct lxc_netdev *netdev = data;
871
872 if (!netdev)
873 return ret_errno(EINVAL);
874
875 clr_config_net_ipv4_gateway(key, lxc_conf, data);
876 if (lxc_config_value_empty(value))
877 return 0;
878
879 if (strequal(value, "auto")) {
880 netdev->ipv4_gateway = NULL;
881 netdev->ipv4_gateway_auto = true;
882 } else if (strequal(value, "dev")) {
883 netdev->ipv4_gateway = NULL;
884 netdev->ipv4_gateway_auto = false;
885 netdev->ipv4_gateway_dev = true;
886 } else {
887 __do_free struct in_addr *gw = NULL;
888 int ret;
889
890 gw = zalloc(sizeof(*gw));
891 if (!gw)
892 return ret_errno(ENOMEM);
893
894 ret = inet_pton(AF_INET, value, gw);
895 if (!ret || ret < 0)
896 return log_error_errno(-1, errno, "Invalid ipv4 gateway address \"%s\"", value);
897
898 netdev->ipv4_gateway = move_ptr(gw);
899 netdev->ipv4_gateway_auto = false;
900 }
901
902 return 0;
903 }
904
905 static int set_config_net_veth_ipv4_route(const char *key, const char *value,
906 struct lxc_conf *lxc_conf, void *data)
907 {
908 __do_free char *valdup = NULL;
909 __do_free struct lxc_inetdev *inetdev = NULL;
910 __do_free struct lxc_list *list = NULL;
911 int ret;
912 char *netmask, *slash;
913 struct lxc_netdev *netdev = data;
914
915 if (!netdev)
916 return ret_errno(EINVAL);
917
918 if (netdev->type != LXC_NET_VETH)
919 return syserror_set(-EINVAL, "Invalid ipv4 route \"%s\", can only be used with veth network", value);
920
921 if (lxc_config_value_empty(value))
922 return clr_config_net_veth_ipv4_route(key, lxc_conf, data);
923
924 inetdev = zalloc(sizeof(*inetdev));
925 if (!inetdev)
926 return ret_errno(ENOMEM);
927
928 list = lxc_list_new();
929 if (!list)
930 return ret_errno(ENOMEM);
931
932 list->elem = inetdev;
933
934 valdup = strdup(value);
935 if (!valdup)
936 return ret_errno(ENOMEM);
937
938 slash = strchr(valdup, '/');
939 if (!slash)
940 return ret_errno(EINVAL);
941
942 *slash = '\0';
943 slash++;
944 if (*slash == '\0')
945 return ret_errno(EINVAL);
946
947 netmask = slash;
948
949 ret = lxc_safe_uint(netmask, &inetdev->prefix);
950 if (ret < 0 || inetdev->prefix > 32)
951 return ret_errno(EINVAL);
952
953 ret = inet_pton(AF_INET, valdup, &inetdev->addr);
954 if (!ret || ret < 0)
955 return ret_errno(EINVAL);
956
957 lxc_list_add_tail(&netdev->priv.veth_attr.ipv4_routes, list);
958 move_ptr(inetdev);
959 move_ptr(list);
960
961 return 0;
962 }
963
964 static int set_config_net_ipv6_address(const char *key, const char *value,
965 struct lxc_conf *lxc_conf, void *data)
966 {
967 __do_free char *valdup = NULL;
968 __do_free struct lxc_inet6dev *inet6dev = NULL;
969 __do_free struct lxc_list *list = NULL;
970 int ret;
971 struct lxc_netdev *netdev = data;
972 char *slash, *netmask;
973
974 if (!netdev)
975 return ret_errno(EINVAL);
976
977 if (lxc_config_value_empty(value))
978 return clr_config_net_ipv6_address(key, lxc_conf, data);
979
980 inet6dev = zalloc(sizeof(*inet6dev));
981 if (!inet6dev)
982 return ret_errno(ENOMEM);
983
984 list = lxc_list_new();
985 if (!list)
986 return ret_errno(ENOMEM);
987
988 valdup = strdup(value);
989 if (!valdup)
990 return ret_errno(ENOMEM);
991
992 inet6dev->prefix = 64;
993 slash = strstr(valdup, "/");
994 if (slash) {
995 *slash = '\0';
996 netmask = slash + 1;
997
998 ret = lxc_safe_uint(netmask, &inet6dev->prefix);
999 if (ret < 0)
1000 return ret;
1001 }
1002
1003 ret = inet_pton(AF_INET6, valdup, &inet6dev->addr);
1004 if (!ret || ret < 0)
1005 return log_error_errno(-EINVAL, EINVAL, "Invalid ipv6 address \"%s\"", valdup);
1006
1007 list->elem = inet6dev;
1008 lxc_list_add_tail(&netdev->ipv6, list);
1009 move_ptr(inet6dev);
1010 move_ptr(list);
1011
1012 return 0;
1013 }
1014
1015 static int set_config_net_ipv6_gateway(const char *key, const char *value,
1016 struct lxc_conf *lxc_conf, void *data)
1017 {
1018 struct lxc_netdev *netdev = data;
1019
1020 if (!netdev)
1021 return ret_errno(EINVAL);
1022
1023 clr_config_net_ipv6_gateway(key, lxc_conf, data);
1024 if (lxc_config_value_empty(value))
1025 return 0;
1026
1027 if (strequal(value, "auto")) {
1028 netdev->ipv6_gateway = NULL;
1029 netdev->ipv6_gateway_auto = true;
1030 } else if (strequal(value, "dev")) {
1031 netdev->ipv6_gateway = NULL;
1032 netdev->ipv6_gateway_auto = false;
1033 netdev->ipv6_gateway_dev = true;
1034 } else {
1035 int ret;
1036 __do_free struct in6_addr *gw = NULL;
1037
1038 gw = zalloc(sizeof(*gw));
1039 if (!gw)
1040 return ret_errno(ENOMEM);
1041
1042 ret = inet_pton(AF_INET6, value, gw);
1043 if (!ret || ret < 0)
1044 return log_error_errno(-EINVAL, EINVAL,
1045 "Invalid ipv6 gateway address \"%s\"", value);
1046
1047 netdev->ipv6_gateway = move_ptr(gw);
1048 netdev->ipv6_gateway_auto = false;
1049 }
1050
1051 return 0;
1052 }
1053
1054 static int set_config_net_veth_ipv6_route(const char *key, const char *value,
1055 struct lxc_conf *lxc_conf, void *data)
1056 {
1057 __do_free char *valdup = NULL;
1058 __do_free struct lxc_inet6dev *inet6dev = NULL;
1059 __do_free struct lxc_list *list = NULL;
1060 int ret;
1061 char *netmask, *slash;
1062 struct lxc_netdev *netdev = data;
1063
1064 if (!netdev)
1065 return ret_errno(EINVAL);
1066
1067 if (netdev->type != LXC_NET_VETH)
1068 return syserror_set(-EINVAL, "Invalid ipv6 route \"%s\", can only be used with veth network", value);
1069
1070 if (lxc_config_value_empty(value))
1071 return clr_config_net_veth_ipv6_route(key, lxc_conf, data);
1072
1073 inet6dev = zalloc(sizeof(*inet6dev));
1074 if (!inet6dev)
1075 return ret_errno(ENOMEM);
1076
1077 list = lxc_list_new();
1078 if (!list)
1079 return ret_errno(ENOMEM);
1080
1081 valdup = strdup(value);
1082 if (!valdup)
1083 return ret_errno(ENOMEM);
1084
1085 slash = strchr(valdup, '/');
1086 if (!slash)
1087 return ret_errno(EINVAL);
1088
1089 *slash = '\0';
1090 slash++;
1091 if (*slash == '\0')
1092 return ret_errno(EINVAL);
1093
1094 netmask = slash;
1095
1096 ret = lxc_safe_uint(netmask, &inet6dev->prefix);
1097 if (ret < 0 || inet6dev->prefix > 128)
1098 return ret_errno(EINVAL);
1099
1100 ret = inet_pton(AF_INET6, valdup, &inet6dev->addr);
1101 if (!ret || ret < 0)
1102 return ret_errno(EINVAL);
1103
1104 list->elem = inet6dev;
1105 lxc_list_add_tail(&netdev->priv.veth_attr.ipv6_routes, list);
1106 move_ptr(inet6dev);
1107 move_ptr(list);
1108
1109 return 0;
1110 }
1111
1112 static int set_config_net_script_up(const char *key, const char *value,
1113 struct lxc_conf *lxc_conf, void *data)
1114 {
1115 struct lxc_netdev *netdev = data;
1116
1117 if (!netdev)
1118 return ret_errno(EINVAL);
1119
1120 clr_config_net_script_up(key, lxc_conf, data);
1121 if (lxc_config_value_empty(value))
1122 return 0;
1123
1124 return set_config_string_item(&netdev->upscript, value);
1125 }
1126
1127 static int set_config_net_script_down(const char *key, const char *value,
1128 struct lxc_conf *lxc_conf, void *data)
1129 {
1130 struct lxc_netdev *netdev = data;
1131
1132 if (!netdev)
1133 return ret_errno(EINVAL);
1134
1135 clr_config_net_script_down(key, lxc_conf, data);
1136 if (lxc_config_value_empty(value))
1137 return 0;
1138
1139 return set_config_string_item(&netdev->downscript, value);
1140 }
1141
1142 static int add_hook(struct lxc_conf *lxc_conf, int which, __owns char *hook)
1143 {
1144 __do_free char *val = hook;
1145 struct lxc_list *hooklist;
1146
1147 hooklist = lxc_list_new();
1148 if (!hooklist)
1149 return ret_errno(ENOMEM);
1150
1151 hooklist->elem = move_ptr(val);
1152 lxc_list_add_tail(&lxc_conf->hooks[which], hooklist);
1153
1154 return 0;
1155 }
1156
1157 static int set_config_seccomp_allow_nesting(const char *key, const char *value,
1158 struct lxc_conf *lxc_conf, void *data)
1159 {
1160 #ifdef HAVE_SECCOMP
1161 if (lxc_config_value_empty(value))
1162 return clr_config_seccomp_allow_nesting(key, lxc_conf, NULL);
1163
1164 if (lxc_safe_uint(value, &lxc_conf->seccomp.allow_nesting) < 0)
1165 return -errno;
1166
1167 if (lxc_conf->seccomp.allow_nesting > 1)
1168 return ret_errno(EINVAL);
1169
1170 return 0;
1171 #else
1172 return ret_errno(ENOSYS);
1173 #endif
1174 }
1175
1176 static int set_config_seccomp_notify_cookie(const char *key, const char *value,
1177 struct lxc_conf *lxc_conf, void *data)
1178 {
1179 #ifdef HAVE_SECCOMP_NOTIFY
1180 return set_config_string_item(&lxc_conf->seccomp.notifier.cookie, value);
1181 #else
1182 return ret_errno(ENOSYS);
1183 #endif
1184 }
1185
1186 static int set_config_seccomp_notify_proxy(const char *key, const char *value,
1187 struct lxc_conf *lxc_conf, void *data)
1188 {
1189 #ifdef HAVE_SECCOMP_NOTIFY
1190 const char *offset;
1191
1192 if (lxc_config_value_empty(value))
1193 return clr_config_seccomp_notify_proxy(key, lxc_conf, NULL);
1194
1195 if (!strnequal(value, "unix:", 5))
1196 return ret_errno(EINVAL);
1197
1198 offset = value + 5;
1199 if (lxc_unix_sockaddr(&lxc_conf->seccomp.notifier.proxy_addr, offset) < 0)
1200 return -errno;
1201
1202 return 0;
1203 #else
1204 return ret_errno(ENOSYS);
1205 #endif
1206 }
1207
1208 static int set_config_seccomp_profile(const char *key, const char *value,
1209 struct lxc_conf *lxc_conf, void *data)
1210 {
1211 #ifdef HAVE_SECCOMP
1212 return set_config_path_item(&lxc_conf->seccomp.seccomp, value);
1213 #else
1214 return ret_errno(ENOSYS);
1215 #endif
1216 }
1217
1218 static int set_config_execute_cmd(const char *key, const char *value,
1219 struct lxc_conf *lxc_conf, void *data)
1220 {
1221 return set_config_path_item(&lxc_conf->execute_cmd, value);
1222 }
1223
1224 static int set_config_init_cmd(const char *key, const char *value,
1225 struct lxc_conf *lxc_conf, void *data)
1226 {
1227 return set_config_path_item(&lxc_conf->init_cmd, value);
1228 }
1229
1230 static int set_config_init_cwd(const char *key, const char *value,
1231 struct lxc_conf *lxc_conf, void *data)
1232 {
1233 return set_config_path_item(&lxc_conf->init_cwd, value);
1234 }
1235
1236 static int set_config_init_uid(const char *key, const char *value,
1237 struct lxc_conf *lxc_conf, void *data)
1238 {
1239 unsigned int init_uid;
1240
1241 if (lxc_config_value_empty(value)) {
1242 lxc_conf->init_uid = 0;
1243 return 0;
1244 }
1245
1246 if (lxc_safe_uint(value, &init_uid) < 0)
1247 return -errno;
1248
1249 lxc_conf->init_uid = init_uid;
1250
1251 return 0;
1252 }
1253
1254 static int set_config_init_gid(const char *key, const char *value,
1255 struct lxc_conf *lxc_conf, void *data)
1256 {
1257 unsigned int init_gid;
1258
1259 if (lxc_config_value_empty(value)) {
1260 lxc_conf->init_gid = 0;
1261 return 0;
1262 }
1263
1264 if (lxc_safe_uint(value, &init_gid) < 0)
1265 return -errno;
1266
1267 lxc_conf->init_gid = init_gid;
1268
1269 return 0;
1270 }
1271
1272 static int set_config_init_groups(const char *key, const char *value,
1273 struct lxc_conf *lxc_conf, void *data)
1274 {
1275 __do_free char *value_dup = NULL;
1276 gid_t *init_groups = NULL;
1277 size_t num_groups = 0;
1278 size_t idx;
1279 char *token;
1280
1281 if (lxc_config_value_empty(value))
1282 return clr_config_init_groups(key, lxc_conf, NULL);
1283
1284 value_dup = strdup(value);
1285 if (!value_dup)
1286 return -ENOMEM;
1287
1288 lxc_iterate_parts(token, value_dup, ",")
1289 num_groups++;
1290
1291 if (num_groups == INT_MAX)
1292 return log_error_errno(-ERANGE, ERANGE, "Excessive number of supplementary groups specified");
1293
1294 /* This means the string wasn't empty and all we found was garbage. */
1295 if (num_groups == 0)
1296 return log_error_errno(-EINVAL, EINVAL, "No valid groups specified %s", value);
1297
1298 idx = lxc_conf->init_groups.size;
1299 init_groups = realloc(lxc_conf->init_groups.list, sizeof(gid_t) * (idx + num_groups));
1300 if (!init_groups)
1301 return ret_errno(ENOMEM);
1302
1303 /*
1304 * Once the realloc() succeeded we need to hand control of the memory
1305 * back to the config otherwise we risk a double-free when
1306 * lxc_conf_free() is called.
1307 */
1308 lxc_conf->init_groups.list = init_groups;
1309
1310 /* Restore duplicated value so we can call lxc_iterate_parts() again. */
1311 strcpy(value_dup, value);
1312
1313 lxc_iterate_parts(token, value_dup, ",") {
1314 int ret;
1315
1316 gid_t group;
1317
1318 ret = lxc_safe_uint(token, &group);
1319 if (ret)
1320 return log_error_errno(ret, -ret, "Failed to parse group %s", token);
1321
1322 init_groups[idx++] = group;
1323 }
1324
1325 lxc_conf->init_groups.size += num_groups;
1326
1327 return 0;
1328 }
1329
1330 static int set_config_hooks(const char *key, const char *value,
1331 struct lxc_conf *lxc_conf, void *data)
1332 {
1333 __do_free char *copy = NULL;
1334
1335 if (lxc_config_value_empty(value))
1336 return lxc_clear_hooks(lxc_conf, key);
1337
1338 if (strequal(key + 4, "hook"))
1339 return log_error_errno(-EINVAL, EINVAL, "lxc.hook must not have a value");
1340
1341 copy = strdup(value);
1342 if (!copy)
1343 return ret_errno(ENOMEM);
1344
1345 if (strequal(key + 9, "pre-start"))
1346 return add_hook(lxc_conf, LXCHOOK_PRESTART, move_ptr(copy));
1347 else if (strequal(key + 9, "start-host"))
1348 return add_hook(lxc_conf, LXCHOOK_START_HOST, move_ptr(copy));
1349 else if (strequal(key + 9, "pre-mount"))
1350 return add_hook(lxc_conf, LXCHOOK_PREMOUNT, move_ptr(copy));
1351 else if (strequal(key + 9, "autodev"))
1352 return add_hook(lxc_conf, LXCHOOK_AUTODEV, move_ptr(copy));
1353 else if (strequal(key + 9, "mount"))
1354 return add_hook(lxc_conf, LXCHOOK_MOUNT, move_ptr(copy));
1355 else if (strequal(key + 9, "start"))
1356 return add_hook(lxc_conf, LXCHOOK_START, move_ptr(copy));
1357 else if (strequal(key + 9, "stop"))
1358 return add_hook(lxc_conf, LXCHOOK_STOP, move_ptr(copy));
1359 else if (strequal(key + 9, "post-stop"))
1360 return add_hook(lxc_conf, LXCHOOK_POSTSTOP, move_ptr(copy));
1361 else if (strequal(key + 9, "clone"))
1362 return add_hook(lxc_conf, LXCHOOK_CLONE, move_ptr(copy));
1363 else if (strequal(key + 9, "destroy"))
1364 return add_hook(lxc_conf, LXCHOOK_DESTROY, move_ptr(copy));
1365
1366 return ret_errno(EINVAL);
1367 }
1368
1369 static int set_config_hooks_version(const char *key, const char *value,
1370 struct lxc_conf *lxc_conf, void *data)
1371 {
1372 int ret;
1373 unsigned int tmp;
1374
1375 if (lxc_config_value_empty(value))
1376 return clr_config_hooks_version(key, lxc_conf, NULL);
1377
1378 ret = lxc_safe_uint(value, &tmp);
1379 if (ret < 0)
1380 return -errno;
1381
1382 if (tmp > 1)
1383 return syserror_set(-EINVAL, "Invalid hook version specified. Currently only 0 (legacy) and 1 are supported");
1384
1385 lxc_conf->hooks_version = tmp;
1386
1387 return 0;
1388 }
1389
1390 static int set_config_personality(const char *key, const char *value,
1391 struct lxc_conf *lxc_conf, void *data)
1392 {
1393 int ret;
1394 personality_t personality;
1395
1396 ret = lxc_config_parse_arch(value, &personality);
1397 if (ret < 0)
1398 return syserror("Unsupported personality \"%s\"", value);
1399
1400 lxc_conf->personality = personality;
1401 return 0;
1402 }
1403
1404 static int set_config_pty_max(const char *key, const char *value,
1405 struct lxc_conf *lxc_conf, void *data)
1406 {
1407 int ret;
1408 unsigned int max = 0;
1409
1410 if (lxc_config_value_empty(value)) {
1411 lxc_conf->pty_max = 0;
1412 return 0;
1413 }
1414
1415 ret = lxc_safe_uint(value, &max);
1416 if (ret < 0)
1417 return ret_errno(EINVAL);
1418
1419 lxc_conf->pty_max = max;
1420
1421 return 0;
1422 }
1423
1424 /* We only need to check whether the first byte of the key after the lxc.start.
1425 * prefix matches our expectations since they fortunately all start with a
1426 * different letter. If anything was wrong with the key we would have already
1427 * noticed when the callback was called.
1428 */
1429 static int set_config_start(const char *key, const char *value,
1430 struct lxc_conf *lxc_conf, void *data)
1431 {
1432 int ret;
1433 bool is_empty;
1434
1435 is_empty = lxc_config_value_empty(value);
1436
1437 if (*(key + 10) == 'a') { /* lxc.start.auto */
1438 if (is_empty) {
1439 lxc_conf->start_auto = 0;
1440 return 0;
1441 }
1442
1443 ret = lxc_safe_uint(value, &lxc_conf->start_auto);
1444 if (ret)
1445 return ret;
1446
1447 if (lxc_conf->start_auto > 1)
1448 return ret_errno(EINVAL);
1449
1450 return 0;
1451 } else if (*(key + 10) == 'd') { /* lxc.start.delay */
1452 if (is_empty) {
1453 lxc_conf->start_delay = 0;
1454 return 0;
1455 }
1456
1457 return lxc_safe_uint(value, &lxc_conf->start_delay);
1458 } else if (*(key + 10) == 'o') { /* lxc.start.order */
1459 if (is_empty) {
1460 lxc_conf->start_order = 0;
1461 return 0;
1462 }
1463
1464 return lxc_safe_int(value, &lxc_conf->start_order);
1465 }
1466
1467 return ret_errno(EINVAL);
1468 }
1469
1470 static int set_config_monitor(const char *key, const char *value,
1471 struct lxc_conf *lxc_conf, void *data)
1472 {
1473 if (lxc_config_value_empty(value)) {
1474 lxc_conf->monitor_unshare = 0;
1475 return 0;
1476 }
1477
1478 if (strequal(key + 12, "unshare"))
1479 return lxc_safe_uint(value, &lxc_conf->monitor_unshare);
1480
1481 return ret_errno(EINVAL);
1482 }
1483
1484 static int set_config_monitor_signal_pdeath(const char *key, const char *value,
1485 struct lxc_conf *lxc_conf, void *data)
1486 {
1487 if (lxc_config_value_empty(value)) {
1488 lxc_conf->monitor_signal_pdeath = 0;
1489 return 0;
1490 }
1491
1492 if (strequal(key + 12, "signal.pdeath")) {
1493 int sig_n;
1494
1495 sig_n = sig_parse(value);
1496 if (sig_n < 0)
1497 return ret_errno(EINVAL);
1498
1499 lxc_conf->monitor_signal_pdeath = sig_n;
1500 return 0;
1501 }
1502
1503 return ret_errno(EINVAL);
1504 }
1505
1506 static int set_config_group(const char *key, const char *value,
1507 struct lxc_conf *lxc_conf, void *data)
1508 {
1509 __do_free char *groups = NULL;
1510 char *token;
1511
1512 if (lxc_config_value_empty(value))
1513 return lxc_clear_groups(lxc_conf);
1514
1515 groups = strdup(value);
1516 if (!groups)
1517 return ret_errno(ENOMEM);
1518
1519 /* In case several groups are specified in a single line split these
1520 * groups in a single element for the list.
1521 */
1522 lxc_iterate_parts(token, groups, " \t") {
1523 __do_free struct lxc_list *grouplist = NULL;
1524
1525 grouplist = lxc_list_new();
1526 if (!grouplist)
1527 return ret_errno(ENOMEM);
1528
1529 grouplist->elem = strdup(token);
1530 if (!grouplist->elem)
1531 return ret_errno(ENOMEM);
1532
1533 lxc_list_add_tail(&lxc_conf->groups, move_ptr(grouplist));
1534 }
1535
1536 return 0;
1537 }
1538
1539 static int set_config_environment(const char *key, const char *value,
1540 struct lxc_conf *lxc_conf, void *data)
1541 {
1542 __do_free char *dup = NULL, *val = NULL;
1543 __do_free struct environment_entry *new_env = NULL;
1544 char *env_val;
1545
1546 if (lxc_config_value_empty(value))
1547 return lxc_clear_environment(lxc_conf);
1548
1549 new_env = zalloc(sizeof(struct environment_entry));
1550 if (!new_env)
1551 return ret_errno(ENOMEM);
1552
1553 dup = strdup(value);
1554 if (!dup)
1555 return ret_errno(ENOMEM);
1556
1557 env_val = strchr(dup, '=');
1558 if (!env_val) {
1559 env_val = getenv(dup);
1560 } else {
1561 *env_val = '\0';
1562 env_val++;
1563 }
1564 if (!env_val)
1565 return ret_errno(ENOENT);
1566
1567 val = strdup(env_val);
1568 if (!val)
1569 return ret_errno(ENOMEM);
1570
1571 new_env->key = move_ptr(dup);
1572 new_env->val = move_ptr(val);
1573
1574 list_add_tail(&new_env->head, &lxc_conf->environment);
1575 move_ptr(new_env);
1576
1577 return 0;
1578 }
1579
1580 static int set_config_tty_max(const char *key, const char *value,
1581 struct lxc_conf *lxc_conf, void *data)
1582 {
1583 int ret;
1584 unsigned int nbtty = 0;
1585
1586 if (lxc_config_value_empty(value)) {
1587 lxc_conf->ttys.max = 0;
1588 return 0;
1589 }
1590
1591 ret = lxc_safe_uint(value, &nbtty);
1592 if (ret < 0)
1593 return ret;
1594
1595 lxc_conf->ttys.max = nbtty;
1596
1597 return 0;
1598 }
1599
1600 static int set_config_tty_dir(const char *key, const char *value,
1601 struct lxc_conf *lxc_conf, void *data)
1602 {
1603 return set_config_string_item_max(&lxc_conf->ttys.dir, value,
1604 NAME_MAX + 1);
1605 }
1606
1607 static int set_config_apparmor_profile(const char *key, const char *value,
1608 struct lxc_conf *lxc_conf, void *data)
1609 {
1610 #if HAVE_APPARMOR
1611 return set_config_string_item(&lxc_conf->lsm_aa_profile, value);
1612 #else
1613 return syserror_set(-EINVAL, "Built without AppArmor support");
1614 #endif
1615 }
1616
1617 static int set_config_apparmor_allow_incomplete(const char *key,
1618 const char *value,
1619 struct lxc_conf *lxc_conf,
1620 void *data)
1621 {
1622 #if HAVE_APPARMOR
1623 int ret;
1624
1625 if (lxc_config_value_empty(value)) {
1626 lxc_conf->lsm_aa_allow_incomplete = 0;
1627 return 0;
1628 }
1629
1630 ret = lxc_safe_uint(value, &lxc_conf->lsm_aa_allow_incomplete);
1631 if (ret)
1632 return ret;
1633
1634 if (lxc_conf->lsm_aa_allow_incomplete > 1)
1635 return ret_errno(EINVAL);
1636
1637 return 0;
1638 #else
1639 return syserror_set(-EINVAL, "Built without AppArmor support");
1640 #endif
1641 }
1642
1643 static int set_config_apparmor_allow_nesting(const char *key,
1644 const char *value,
1645 struct lxc_conf *lxc_conf,
1646 void *data)
1647 {
1648 #if HAVE_APPARMOR
1649 int ret;
1650
1651 if (lxc_config_value_empty(value))
1652 return clr_config_apparmor_allow_nesting(key, lxc_conf, NULL);
1653
1654 ret = lxc_safe_uint(value, &lxc_conf->lsm_aa_allow_nesting);
1655 if (ret)
1656 return ret;
1657
1658 if (lxc_conf->lsm_aa_allow_nesting > 1)
1659 return ret_errno(EINVAL);
1660
1661 return 0;
1662 #else
1663 return syserror_set(-EINVAL, "Built without AppArmor support");
1664 #endif
1665 }
1666
1667 static int set_config_apparmor_raw(const char *key,
1668 const char *value,
1669 struct lxc_conf *lxc_conf,
1670 void *data)
1671 {
1672 #if HAVE_APPARMOR
1673 __do_free char *elem = NULL;
1674 __do_free struct lxc_list *list = NULL;
1675
1676 if (lxc_config_value_empty(value))
1677 return lxc_clear_apparmor_raw(lxc_conf);
1678
1679 list = lxc_list_new();
1680 if (!list)
1681 return ret_errno(ENOMEM);
1682
1683 elem = strdup(value);
1684 if (!elem)
1685 return ret_errno(ENOMEM);
1686
1687 list->elem = move_ptr(elem);
1688 lxc_list_add_tail(&lxc_conf->lsm_aa_raw, move_ptr(list));
1689
1690 return 0;
1691 #else
1692 return syserror_set(-EINVAL, "Built without AppArmor support");
1693 #endif
1694 }
1695
1696 static int set_config_selinux_context(const char *key, const char *value,
1697 struct lxc_conf *lxc_conf, void *data)
1698 {
1699 #if HAVE_SELINUX
1700 return set_config_string_item(&lxc_conf->lsm_se_context, value);
1701 #else
1702 return syserror_set(-EINVAL, "Built without SELinux support");
1703 #endif
1704 }
1705
1706 static int set_config_selinux_context_keyring(const char *key, const char *value,
1707 struct lxc_conf *lxc_conf, void *data)
1708 {
1709 #if HAVE_SELINUX
1710 return set_config_string_item(&lxc_conf->lsm_se_keyring_context, value);
1711 #else
1712 return syserror_set(-EINVAL, "Built without SELinux support");
1713 #endif
1714 }
1715
1716 static int set_config_keyring_session(const char *key, const char *value,
1717 struct lxc_conf *lxc_conf, void *data)
1718 {
1719 return set_config_bool_item(&lxc_conf->keyring_disable_session, value, false);
1720 }
1721
1722 static int set_config_log_file(const char *key, const char *value,
1723 struct lxc_conf *c, void *data)
1724 {
1725 int ret;
1726
1727 if (lxc_config_value_empty(value)) {
1728 free_disarm(c->logfile);
1729 return 0;
1730 }
1731
1732 /*
1733 * Store these values in the lxc_conf, and then try to set for actual
1734 * current logging.
1735 */
1736 ret = set_config_path_item(&c->logfile, value);
1737 if (ret == 0)
1738 ret = lxc_log_set_file(&c->logfd, c->logfile);
1739
1740 return ret;
1741 }
1742
1743 static int set_config_log_level(const char *key, const char *value,
1744 struct lxc_conf *lxc_conf, void *data)
1745 {
1746 int newlevel;
1747
1748 if (lxc_config_value_empty(value)) {
1749 lxc_conf->loglevel = LXC_LOG_LEVEL_NOTSET;
1750 return 0;
1751 }
1752
1753 if (value[0] >= '0' && value[0] <= '9') {
1754 int ret;
1755
1756 ret = lxc_safe_int(value, &newlevel);
1757 if (ret)
1758 return ret_errno(EINVAL);
1759 } else {
1760 newlevel = lxc_log_priority_to_int(value);
1761 }
1762
1763 /*
1764 * Store these values in the lxc_conf, and then try to set for actual
1765 * current logging.
1766 */
1767 lxc_conf->loglevel = newlevel;
1768
1769 return lxc_log_set_level(&lxc_conf->loglevel, newlevel);
1770 }
1771
1772 static int set_config_autodev(const char *key, const char *value,
1773 struct lxc_conf *lxc_conf, void *data)
1774 {
1775 int ret;
1776
1777 if (lxc_config_value_empty(value)) {
1778 lxc_conf->autodev = 0;
1779 return 0;
1780 }
1781
1782 ret = lxc_safe_uint(value, &lxc_conf->autodev);
1783 if (ret)
1784 return ret_errno(EINVAL);
1785
1786 if (lxc_conf->autodev > 1)
1787 return ret_errno(EINVAL);
1788
1789 return 0;
1790 }
1791
1792 static int set_config_autodev_tmpfs_size(const char *key, const char *value,
1793 struct lxc_conf *lxc_conf, void *data)
1794 {
1795 if (lxc_config_value_empty(value)) {
1796 lxc_conf->autodevtmpfssize = 500000;
1797 return 0;
1798 }
1799
1800 if (lxc_safe_int(value, &lxc_conf->autodevtmpfssize) < 0)
1801 lxc_conf->autodevtmpfssize = 500000;
1802
1803 return 0;
1804 }
1805
1806 static int set_config_signal_halt(const char *key, const char *value,
1807 struct lxc_conf *lxc_conf, void *data)
1808 {
1809 int sig_n;
1810
1811 if (lxc_config_value_empty(value)) {
1812 lxc_conf->haltsignal = 0;
1813 return 0;
1814 }
1815
1816 sig_n = sig_parse(value);
1817 if (sig_n < 0)
1818 return ret_errno(EINVAL);
1819
1820 lxc_conf->haltsignal = sig_n;
1821
1822 return 0;
1823 }
1824
1825 static int set_config_signal_reboot(const char *key, const char *value,
1826 struct lxc_conf *lxc_conf, void *data)
1827 {
1828 int sig_n;
1829
1830 if (lxc_config_value_empty(value)) {
1831 lxc_conf->rebootsignal = 0;
1832 return 0;
1833 }
1834
1835 sig_n = sig_parse(value);
1836 if (sig_n < 0)
1837 return ret_errno(EINVAL);
1838
1839 lxc_conf->rebootsignal = sig_n;
1840
1841 return 0;
1842 }
1843
1844 static int set_config_signal_stop(const char *key, const char *value,
1845 struct lxc_conf *lxc_conf, void *data)
1846 {
1847 int sig_n;
1848
1849 if (lxc_config_value_empty(value)) {
1850 lxc_conf->stopsignal = 0;
1851 return 0;
1852 }
1853
1854 sig_n = sig_parse(value);
1855 if (sig_n < 0)
1856 return ret_errno(EINVAL);
1857
1858 lxc_conf->stopsignal = sig_n;
1859
1860 return 0;
1861 }
1862
1863 static int __set_config_cgroup_controller(const char *key, const char *value,
1864 struct lxc_conf *lxc_conf, int version)
1865 {
1866 call_cleaner(free_lxc_cgroup) struct lxc_cgroup *new_cgroup = NULL;
1867 const char *subkey, *token;
1868 size_t token_len;
1869
1870 if (lxc_config_value_empty(value))
1871 return lxc_clear_cgroups(lxc_conf, key, version);
1872
1873 if (version == CGROUP2_SUPER_MAGIC) {
1874 token = "lxc.cgroup2.";
1875 token_len = 12;
1876 } else if (version == CGROUP_SUPER_MAGIC) {
1877 token = "lxc.cgroup.";
1878 token_len = 11;
1879 } else {
1880 return ret_errno(EINVAL);
1881 }
1882
1883 if (!strnequal(key, token, token_len))
1884 return ret_errno(EINVAL);
1885
1886 subkey = key + token_len;
1887 if (*subkey == '\0')
1888 return ret_errno(EINVAL);
1889
1890 new_cgroup = zalloc(sizeof(*new_cgroup));
1891 if (!new_cgroup)
1892 return ret_errno(ENOMEM);
1893
1894 new_cgroup->subsystem = strdup(subkey);
1895 if (!new_cgroup->subsystem)
1896 return ret_errno(ENOMEM);
1897
1898 new_cgroup->value = strdup(value);
1899 if (!new_cgroup->value)
1900 return ret_errno(ENOMEM);
1901
1902 new_cgroup->version = version;
1903
1904 if (version == CGROUP2_SUPER_MAGIC)
1905 list_add_tail(&new_cgroup->head, &lxc_conf->cgroup2);
1906 else
1907 list_add_tail(&new_cgroup->head, &lxc_conf->cgroup);
1908 move_ptr(new_cgroup);
1909
1910 return 0;
1911 }
1912
1913 static int set_config_cgroup_controller(const char *key, const char *value,
1914 struct lxc_conf *lxc_conf, void *data)
1915 {
1916 return __set_config_cgroup_controller(key, value, lxc_conf,
1917 CGROUP_SUPER_MAGIC);
1918 }
1919
1920 static int set_config_cgroup2_controller(const char *key, const char *value,
1921 struct lxc_conf *lxc_conf, void *data)
1922 {
1923 return __set_config_cgroup_controller(key, value, lxc_conf,
1924 CGROUP2_SUPER_MAGIC);
1925 }
1926
1927 static int set_config_cgroup_dir(const char *key, const char *value,
1928 struct lxc_conf *lxc_conf, void *data)
1929 {
1930 if (!strequal(key, "lxc.cgroup.dir"))
1931 return ret_errno(EINVAL);
1932
1933 if (lxc_config_value_empty(value))
1934 return clr_config_cgroup_dir(key, lxc_conf, NULL);
1935
1936 if (abspath(value))
1937 return syserror_set(-EINVAL, "%s paths may not be absolute", key);
1938
1939 if (dotdot(value))
1940 return syserror_set(-EINVAL, "%s paths may not walk upwards via \"../\"", key);
1941
1942 return set_config_path_item(&lxc_conf->cgroup_meta.dir, value);
1943 }
1944
1945 static int set_config_cgroup_monitor_dir(const char *key, const char *value,
1946 struct lxc_conf *lxc_conf, void *data)
1947 {
1948 if (lxc_config_value_empty(value))
1949 return clr_config_cgroup_monitor_dir(key, lxc_conf, NULL);
1950
1951 if (abspath(value))
1952 return syserror_set(-EINVAL, "%s paths may not be absolute", key);
1953
1954 if (dotdot(value))
1955 return syserror_set(-EINVAL, "%s paths may not walk upwards via \"../\"", key);
1956
1957 return set_config_path_item(&lxc_conf->cgroup_meta.monitor_dir, value);
1958 }
1959
1960 static int set_config_cgroup_monitor_pivot_dir(const char *key, const char *value,
1961 struct lxc_conf *lxc_conf, void *data)
1962 {
1963 if (lxc_config_value_empty(value))
1964 return clr_config_cgroup_monitor_pivot_dir(key, lxc_conf, NULL);
1965
1966 if (abspath(value))
1967 return syserror_set(-EINVAL, "%s paths may not be absolute", key);
1968
1969 if (dotdot(value))
1970 return syserror_set(-EINVAL, "%s paths may not walk upwards via \"../\"", key);
1971
1972 return set_config_path_item(&lxc_conf->cgroup_meta.monitor_pivot_dir, value);
1973 }
1974
1975 static int set_config_cgroup_container_dir(const char *key, const char *value,
1976 struct lxc_conf *lxc_conf,
1977 void *data)
1978 {
1979 if (lxc_config_value_empty(value))
1980 return clr_config_cgroup_container_dir(key, lxc_conf, NULL);
1981
1982 if (abspath(value))
1983 return syserror_set(-EINVAL, "%s paths may not be absolute", key);
1984
1985 if (dotdot(value))
1986 return syserror_set(-EINVAL, "%s paths may not walk upwards via \"../\"", key);
1987
1988 return set_config_path_item(&lxc_conf->cgroup_meta.container_dir, value);
1989 }
1990
1991 static int set_config_cgroup_container_inner_dir(const char *key,
1992 const char *value,
1993 struct lxc_conf *lxc_conf,
1994 void *data)
1995 {
1996 if (lxc_config_value_empty(value))
1997 return clr_config_cgroup_container_inner_dir(key, lxc_conf, NULL);
1998
1999 if (abspath(value))
2000 return syserror_set(-EINVAL, "%s paths may not be absolute", key);
2001
2002 if (strchr(value, '/') || strequal(value, ".") || strequal(value, ".."))
2003 return log_error_errno(-EINVAL, EINVAL, "lxc.cgroup.dir.container.inner must be a single directory name");
2004
2005 return set_config_string_item(&lxc_conf->cgroup_meta.namespace_dir, value);
2006 }
2007
2008 static int set_config_cgroup_relative(const char *key, const char *value,
2009 struct lxc_conf *lxc_conf, void *data)
2010 {
2011 unsigned int converted;
2012 int ret;
2013
2014 if (lxc_config_value_empty(value))
2015 return clr_config_cgroup_relative(key, lxc_conf, NULL);
2016
2017 ret = lxc_safe_uint(value, &converted);
2018 if (ret)
2019 return ret;
2020
2021 if (converted == 1) {
2022 lxc_conf->cgroup_meta.relative = true;
2023 return 0;
2024 }
2025
2026 if (converted == 0) {
2027 lxc_conf->cgroup_meta.relative = false;
2028 return 0;
2029 }
2030
2031 return ret_errno(EINVAL);
2032 }
2033
2034 static bool parse_limit_value(const char **value, rlim_t *res)
2035 {
2036 char *endptr = NULL;
2037
2038 if (strnequal(*value, "unlimited", STRLITERALLEN("unlimited"))) {
2039 *res = RLIM_INFINITY;
2040 *value += STRLITERALLEN("unlimited");
2041 return true;
2042 }
2043
2044 errno = 0;
2045 *res = strtoull(*value, &endptr, 10);
2046 if (errno || !endptr)
2047 return false;
2048
2049 *value = endptr;
2050
2051 return true;
2052 }
2053
2054 static int set_config_prlimit(const char *key, const char *value,
2055 struct lxc_conf *lxc_conf, void *data)
2056 {
2057 call_cleaner(free_lxc_limit) struct lxc_limit *new_lim = NULL;
2058 struct rlimit limit;
2059 rlim_t limit_value;
2060 struct lxc_limit *lim;
2061
2062 if (lxc_config_value_empty(value))
2063 return lxc_clear_limits(lxc_conf, key);
2064
2065 if (!strnequal(key, "lxc.prlimit.", STRLITERALLEN("lxc.prlimit.")))
2066 return ret_errno(EINVAL);
2067
2068 key += STRLITERALLEN("lxc.prlimit.");
2069
2070 /* soft limit comes first in the value */
2071 if (!parse_limit_value(&value, &limit_value))
2072 return ret_errno(EINVAL);
2073
2074 limit.rlim_cur = limit_value;
2075
2076 /* skip spaces and a colon */
2077 while (isspace(*value))
2078 ++value;
2079
2080 if (*value == ':')
2081 ++value;
2082 else if (*value) /* any other character is an error here */
2083 return ret_errno(EINVAL);
2084
2085 while (isspace(*value))
2086 ++value;
2087
2088 /* optional hard limit */
2089 if (*value) {
2090 if (!parse_limit_value(&value, &limit_value))
2091 return ret_errno(EINVAL);
2092
2093 limit.rlim_max = limit_value;
2094
2095 /* check for trailing garbage */
2096 while (isspace(*value))
2097 ++value;
2098
2099 if (*value)
2100 return ret_errno(EINVAL);
2101 } else {
2102 /* a single value sets both hard and soft limit */
2103 limit.rlim_max = limit.rlim_cur;
2104 }
2105
2106 /* find existing list element */
2107 list_for_each_entry(lim, &lxc_conf->limits, head) {
2108 if (!strequal(key, lim->resource))
2109 continue;
2110
2111 lim->limit = limit;
2112 return 0;
2113 }
2114
2115 new_lim = zalloc(sizeof(*new_lim));
2116 if (!new_lim)
2117 return ret_errno(ENOMEM);
2118
2119 new_lim->resource = strdup(key);
2120 if (!new_lim->resource)
2121 return ret_errno(ENOMEM);
2122
2123 new_lim->limit = limit;
2124 list_add_tail(&new_lim->head, &lxc_conf->limits);
2125 move_ptr(new_lim);
2126
2127 return 0;
2128 }
2129
2130 static int set_config_sysctl(const char *key, const char *value,
2131 struct lxc_conf *lxc_conf, void *data)
2132 {
2133 call_cleaner(free_lxc_sysctl) struct lxc_sysctl *sysctl_elem = NULL;
2134 struct lxc_sysctl *sysctl, *nsysctl;
2135
2136 if (lxc_config_value_empty(value))
2137 return clr_config_sysctl(key, lxc_conf, NULL);
2138
2139 if (!strnequal(key, "lxc.sysctl.", STRLITERALLEN("lxc.sysctl.")))
2140 return ret_errno(EINVAL);
2141
2142 key += STRLITERALLEN("lxc.sysctl.");
2143 if (is_empty_string(key))
2144 return ret_errno(EINVAL);
2145
2146 /* find existing list element */
2147 list_for_each_entry_safe(sysctl, nsysctl, &lxc_conf->sysctls, head) {
2148 __do_free char *replace_value = NULL;
2149
2150 if (!strequal(key, sysctl->key))
2151 continue;
2152
2153 replace_value = strdup(value);
2154 if (!replace_value)
2155 return ret_errno(EINVAL);
2156
2157 free(sysctl->value);
2158 sysctl->value = move_ptr(replace_value);
2159
2160 return 0;
2161 }
2162
2163 sysctl_elem = zalloc(sizeof(*sysctl_elem));
2164 if (!sysctl_elem)
2165 return ret_errno(ENOMEM);
2166
2167 sysctl_elem->key = strdup(key);
2168 if (!sysctl_elem->key)
2169 return ret_errno(ENOMEM);
2170
2171 sysctl_elem->value = strdup(value);
2172 if (!sysctl_elem->value)
2173 return ret_errno(ENOMEM);
2174
2175 list_add_tail(&sysctl_elem->head, &lxc_conf->sysctls);
2176 move_ptr(sysctl_elem);
2177
2178 return 0;
2179 }
2180
2181 static int set_config_proc(const char *key, const char *value,
2182 struct lxc_conf *lxc_conf, void *data)
2183 {
2184 call_cleaner(free_lxc_proc) struct lxc_proc *new_proc = NULL;
2185 const char *subkey;
2186
2187 if (lxc_config_value_empty(value))
2188 return clr_config_proc(key, lxc_conf, NULL);
2189
2190 if (!strnequal(key, "lxc.proc.", STRLITERALLEN("lxc.proc.")))
2191 return ret_errno(EINVAL);
2192
2193 subkey = key + STRLITERALLEN("lxc.proc.");
2194 if (*subkey == '\0')
2195 return ret_errno(EINVAL);
2196
2197 new_proc = zalloc(sizeof(*new_proc));
2198 if (!new_proc)
2199 return ret_errno(ENOMEM);
2200
2201 new_proc->filename = strdup(subkey);
2202 if (!new_proc->filename)
2203 return ret_errno(ENOMEM);
2204
2205 new_proc->value = strdup(value);
2206 if (!new_proc->value)
2207 return ret_errno(ENOMEM);
2208
2209 list_add_tail(&new_proc->head, &lxc_conf->procs);
2210 move_ptr(new_proc);
2211
2212 return 0;
2213 }
2214
2215 static int set_config_idmaps(const char *key, const char *value,
2216 struct lxc_conf *lxc_conf, void *data)
2217 {
2218 __do_free struct id_map *idmap = NULL;
2219 unsigned long hostid, nsid, range;
2220 char type;
2221 int ret;
2222
2223 if (lxc_config_value_empty(value))
2224 return lxc_clear_idmaps(lxc_conf);
2225
2226 idmap = zalloc(sizeof(*idmap));
2227 if (!idmap)
2228 return ret_errno(ENOMEM);
2229
2230 ret = parse_idmaps(value, &type, &nsid, &hostid, &range);
2231 if (ret < 0)
2232 return log_error_errno(-EINVAL, EINVAL, "Failed to parse id mappings");
2233
2234 INFO("Read uid map: type %c nsid %lu hostid %lu range %lu", type, nsid, hostid, range);
2235 if (type == 'u')
2236 idmap->idtype = ID_TYPE_UID;
2237 else if (type == 'g')
2238 idmap->idtype = ID_TYPE_GID;
2239 else
2240 return ret_errno(EINVAL);
2241
2242 idmap->hostid = hostid;
2243 idmap->nsid = nsid;
2244 idmap->range = range;
2245 list_add_tail(&idmap->head, &lxc_conf->id_map);
2246
2247 if (!lxc_conf->root_nsuid_map && idmap->idtype == ID_TYPE_UID)
2248 if (idmap->nsid == 0)
2249 lxc_conf->root_nsuid_map = idmap;
2250
2251 if (!lxc_conf->root_nsgid_map && idmap->idtype == ID_TYPE_GID)
2252 if (idmap->nsid == 0)
2253 lxc_conf->root_nsgid_map = idmap;
2254
2255 move_ptr(idmap);
2256
2257 return 0;
2258 }
2259
2260 static int set_config_mount_fstab(const char *key, const char *value,
2261 struct lxc_conf *lxc_conf, void *data)
2262 {
2263 if (lxc_config_value_empty(value)) {
2264 clr_config_mount_fstab(key, lxc_conf, NULL);
2265 return ret_errno(EINVAL);
2266 }
2267
2268 return set_config_path_item(&lxc_conf->fstab, value);
2269 }
2270
2271 static int set_config_mount_auto(const char *key, const char *value,
2272 struct lxc_conf *lxc_conf, void *data)
2273 {
2274 __do_free char *autos = NULL;
2275 char *token;
2276 int i;
2277 static struct {
2278 const char *token;
2279 int mask;
2280 int flag;
2281 } allowed_auto_mounts[] = {
2282 { "proc", LXC_AUTO_PROC_MASK, LXC_AUTO_PROC_MIXED },
2283 { "proc:mixed", LXC_AUTO_PROC_MASK, LXC_AUTO_PROC_MIXED },
2284 { "proc:rw", LXC_AUTO_PROC_MASK, LXC_AUTO_PROC_RW },
2285 { "sys", LXC_AUTO_SYS_MASK, LXC_AUTO_SYS_MIXED },
2286 { "sys:ro", LXC_AUTO_SYS_MASK, LXC_AUTO_SYS_RO },
2287 { "sys:mixed", LXC_AUTO_SYS_MASK, LXC_AUTO_SYS_MIXED },
2288 { "sys:rw", LXC_AUTO_SYS_MASK, LXC_AUTO_SYS_RW },
2289 { "cgroup", LXC_AUTO_CGROUP_MASK, LXC_AUTO_CGROUP_NOSPEC },
2290 { "cgroup:mixed", LXC_AUTO_CGROUP_MASK, LXC_AUTO_CGROUP_MIXED },
2291 { "cgroup:ro", LXC_AUTO_CGROUP_MASK, LXC_AUTO_CGROUP_RO },
2292 { "cgroup:rw", LXC_AUTO_CGROUP_MASK, LXC_AUTO_CGROUP_RW },
2293 { "cgroup:force", LXC_AUTO_CGROUP_MASK, LXC_AUTO_CGROUP_NOSPEC | LXC_AUTO_CGROUP_FORCE },
2294 { "cgroup:mixed:force", LXC_AUTO_CGROUP_MASK, LXC_AUTO_CGROUP_MIXED | LXC_AUTO_CGROUP_FORCE },
2295 { "cgroup:ro:force", LXC_AUTO_CGROUP_MASK, LXC_AUTO_CGROUP_RO | LXC_AUTO_CGROUP_FORCE },
2296 { "cgroup:rw:force", LXC_AUTO_CGROUP_MASK, LXC_AUTO_CGROUP_RW | LXC_AUTO_CGROUP_FORCE },
2297 { "cgroup-full", LXC_AUTO_CGROUP_MASK, LXC_AUTO_CGROUP_FULL_NOSPEC },
2298 { "cgroup-full:mixed", LXC_AUTO_CGROUP_MASK, LXC_AUTO_CGROUP_FULL_MIXED },
2299 { "cgroup-full:ro", LXC_AUTO_CGROUP_MASK, LXC_AUTO_CGROUP_FULL_RO },
2300 { "cgroup-full:rw", LXC_AUTO_CGROUP_MASK, LXC_AUTO_CGROUP_FULL_RW },
2301 { "cgroup-full:force", LXC_AUTO_CGROUP_MASK, LXC_AUTO_CGROUP_FULL_NOSPEC | LXC_AUTO_CGROUP_FORCE },
2302 { "cgroup-full:mixed:force", LXC_AUTO_CGROUP_MASK, LXC_AUTO_CGROUP_FULL_MIXED | LXC_AUTO_CGROUP_FORCE },
2303 { "cgroup-full:ro:force", LXC_AUTO_CGROUP_MASK, LXC_AUTO_CGROUP_FULL_RO | LXC_AUTO_CGROUP_FORCE },
2304 { "cgroup-full:rw:force", LXC_AUTO_CGROUP_MASK, LXC_AUTO_CGROUP_FULL_RW | LXC_AUTO_CGROUP_FORCE },
2305 { "shmounts:", LXC_AUTO_SHMOUNTS_MASK, LXC_AUTO_SHMOUNTS },
2306 /*
2307 * For adding anything that is just a single on/off, but has no
2308 * options: keep mask and flag identical and just define the
2309 * enum value as an unused bit so far
2310 */
2311 { NULL, 0, 0 }
2312 };
2313
2314 if (lxc_config_value_empty(value)) {
2315 lxc_conf->auto_mounts = 0;
2316 return 0;
2317 }
2318
2319 autos = strdup(value);
2320 if (!autos)
2321 return ret_errno(ENOMEM);
2322
2323 lxc_iterate_parts(token, autos, " \t") {
2324 bool is_shmounts = false;
2325
2326 for (i = 0; allowed_auto_mounts[i].token; i++) {
2327 if (strequal(allowed_auto_mounts[i].token, token))
2328 break;
2329
2330 if (strequal("shmounts:", allowed_auto_mounts[i].token) &&
2331 strnequal("shmounts:", token, STRLITERALLEN("shmounts:"))) {
2332 is_shmounts = true;
2333 break;
2334 }
2335 }
2336
2337 if (!allowed_auto_mounts[i].token)
2338 return log_error_errno(-EINVAL, EINVAL, "Invalid filesystem to automount \"%s\"", token);
2339
2340 lxc_conf->auto_mounts &= ~allowed_auto_mounts[i].mask;
2341 lxc_conf->auto_mounts |= allowed_auto_mounts[i].flag;
2342
2343 if (is_shmounts) {
2344 __do_free char *container_path = NULL, *host_path = NULL;
2345 char *val;
2346
2347 val = token + STRLITERALLEN("shmounts:");
2348 if (*val == '\0')
2349 return log_error_errno(-EINVAL, EINVAL, "Failed to copy shmounts host path");
2350
2351 host_path = strdup(val);
2352 if (!host_path)
2353 return log_error_errno(-EINVAL, EINVAL, "Failed to copy shmounts host path");
2354
2355 val = strchr(host_path, ':');
2356 if (!val || *(val + 1) == '\0')
2357 val = "/dev/.lxc-mounts";
2358 else
2359 *val++ = '\0';
2360
2361 container_path = strdup(val);
2362 if(!container_path)
2363 return log_error_errno(-EINVAL, EINVAL, "Failed to copy shmounts container path");
2364
2365 free_disarm(lxc_conf->shmount.path_host);
2366 lxc_conf->shmount.path_host = move_ptr(host_path);
2367
2368 free_disarm(lxc_conf->shmount.path_cont);
2369 lxc_conf->shmount.path_cont = move_ptr(container_path);
2370 }
2371 }
2372
2373 return 0;
2374 }
2375
2376 static int set_config_mount(const char *key, const char *value,
2377 struct lxc_conf *lxc_conf, void *data)
2378 {
2379 __do_free char *mntelem = NULL;
2380 __do_free struct lxc_list *mntlist = NULL;
2381
2382 if (lxc_config_value_empty(value))
2383 return lxc_clear_mount_entries(lxc_conf);
2384
2385 mntlist = lxc_list_new();
2386 if (!mntlist)
2387 return ret_errno(ENOMEM);
2388
2389 mntelem = strdup(value);
2390 if (!mntelem)
2391 return ret_errno(ENOMEM);
2392
2393 mntlist->elem = move_ptr(mntelem);
2394 lxc_list_add_tail(&lxc_conf->mount_list, move_ptr(mntlist));
2395
2396 return 0;
2397 }
2398
2399 int add_elem_to_mount_list(const char *value, struct lxc_conf *lxc_conf) {
2400 return set_config_mount(NULL, value, lxc_conf, NULL);
2401 }
2402
2403 static int set_config_cap_keep(const char *key, const char *value,
2404 struct lxc_conf *lxc_conf, void *data)
2405 {
2406 __do_free char *keepcaps = NULL;
2407 __do_free struct lxc_list *keeplist = NULL;
2408 char *token;
2409
2410 if (lxc_config_value_empty(value))
2411 return lxc_clear_config_keepcaps(lxc_conf);
2412
2413 keepcaps = strdup(value);
2414 if (!keepcaps)
2415 return ret_errno(ENOMEM);
2416
2417 /* In case several capability keep is specified in a single line
2418 * split these caps in a single element for the list.
2419 */
2420 lxc_iterate_parts(token, keepcaps, " \t") {
2421 if (strequal(token, "none"))
2422 lxc_clear_config_keepcaps(lxc_conf);
2423
2424 keeplist = lxc_list_new();
2425 if (!keeplist)
2426 return ret_errno(ENOMEM);
2427
2428 keeplist->elem = strdup(token);
2429 if (!keeplist->elem)
2430 return ret_errno(ENOMEM);
2431
2432 lxc_list_add_tail(&lxc_conf->keepcaps, move_ptr(keeplist));
2433 }
2434
2435 return 0;
2436 }
2437
2438 static int set_config_cap_drop(const char *key, const char *value,
2439 struct lxc_conf *lxc_conf, void *data)
2440 {
2441 __do_free char *dropcaps = NULL;
2442 __do_free struct lxc_list *droplist = NULL;
2443 char *token;
2444
2445 if (lxc_config_value_empty(value))
2446 return lxc_clear_config_caps(lxc_conf);
2447
2448 dropcaps = strdup(value);
2449 if (!dropcaps)
2450 return ret_errno(ENOMEM);
2451
2452 /* In case several capability drop is specified in a single line
2453 * split these caps in a single element for the list.
2454 */
2455 lxc_iterate_parts(token, dropcaps, " \t") {
2456 droplist = lxc_list_new();
2457 if (!droplist)
2458 return ret_errno(ENOMEM);
2459
2460 droplist->elem = strdup(token);
2461 if (!droplist->elem)
2462 return ret_errno(ENOMEM);
2463
2464 lxc_list_add_tail(&lxc_conf->caps, move_ptr(droplist));
2465 }
2466
2467 return 0;
2468 }
2469
2470 static int set_config_console_path(const char *key, const char *value,
2471 struct lxc_conf *lxc_conf, void *data)
2472 {
2473 return set_config_path_item(&lxc_conf->console.path, value);
2474 }
2475
2476 static int set_config_console_rotate(const char *key, const char *value,
2477 struct lxc_conf *lxc_conf, void *data)
2478 {
2479 int ret;
2480
2481 if (lxc_config_value_empty(value)) {
2482 lxc_conf->console.log_rotate = 0;
2483 return 0;
2484 }
2485
2486 ret = lxc_safe_uint(value, &lxc_conf->console.log_rotate);
2487 if (ret)
2488 return ret_errno(EINVAL);
2489
2490 if (lxc_conf->console.log_rotate > 1)
2491 return log_error_errno(-EINVAL, EINVAL, "The \"lxc.console.rotate\" config key can only be set to 0 or 1");
2492
2493 return 0;
2494 }
2495
2496 static int set_config_console_logfile(const char *key, const char *value,
2497 struct lxc_conf *lxc_conf, void *data)
2498 {
2499 return set_config_path_item(&lxc_conf->console.log_path, value);
2500 }
2501
2502 static int set_config_console_buffer_size(const char *key, const char *value,
2503 struct lxc_conf *lxc_conf, void *data)
2504 {
2505 int ret;
2506 long long int size;
2507 uint64_t buffer_size, pgsz;
2508
2509 if (lxc_config_value_empty(value)) {
2510 lxc_conf->console.buffer_size = 0;
2511 return 0;
2512 }
2513
2514 /* If the user specified "auto" the default log size is 2^17 = 128 Kib */
2515 if (strequal(value, "auto")) {
2516 lxc_conf->console.buffer_size = 1 << 17;
2517 return 0;
2518 }
2519
2520 ret = parse_byte_size_string(value, &size);
2521 if (ret)
2522 return ret;
2523
2524 if (size < 0)
2525 return ret_errno(EINVAL);
2526
2527 /* must be at least a page size */
2528 pgsz = lxc_getpagesize();
2529 if ((uint64_t)size < pgsz) {
2530 NOTICE("Requested ringbuffer size for the console is %lld but must be at least %" PRId64 " bytes. Setting ringbuffer size to %" PRId64 " bytes",
2531 size, pgsz, pgsz);
2532 size = pgsz;
2533 }
2534
2535 buffer_size = lxc_find_next_power2((uint64_t)size);
2536 if (buffer_size == 0)
2537 return ret_errno(EINVAL);
2538
2539 if (buffer_size != size)
2540 NOTICE("Passed size was not a power of 2. Rounding log size to next power of two: %" PRIu64 " bytes", buffer_size);
2541
2542 lxc_conf->console.buffer_size = buffer_size;
2543
2544 return 0;
2545 }
2546
2547 static int set_config_console_size(const char *key, const char *value,
2548 struct lxc_conf *lxc_conf, void *data)
2549 {
2550 int ret;
2551 long long int size;
2552 uint64_t log_size, pgsz;
2553
2554 if (lxc_config_value_empty(value)) {
2555 lxc_conf->console.log_size = 0;
2556 return 0;
2557 }
2558
2559 /* If the user specified "auto" the default log size is 2^17 = 128 Kib */
2560 if (strequal(value, "auto")) {
2561 lxc_conf->console.log_size = 1 << 17;
2562 return 0;
2563 }
2564
2565 ret = parse_byte_size_string(value, &size);
2566 if (ret)
2567 return ret_errno(EINVAL);
2568
2569 if (size < 0)
2570 return ret_errno(EINVAL);
2571
2572 /* must be at least a page size */
2573 pgsz = lxc_getpagesize();
2574 if ((uint64_t)size < pgsz) {
2575 NOTICE("Requested ringbuffer size for the console is %lld but must be at least %" PRId64 " bytes. Setting ringbuffer size to %" PRId64 " bytes",
2576 size, pgsz, pgsz);
2577 size = pgsz;
2578 }
2579
2580 log_size = lxc_find_next_power2((uint64_t)size);
2581 if (log_size == 0)
2582 return ret_errno(EINVAL);
2583
2584 if (log_size != size)
2585 NOTICE("Passed size was not a power of 2. Rounding log size to next power of two: %" PRIu64 " bytes", log_size);
2586
2587 lxc_conf->console.log_size = log_size;
2588
2589 return 0;
2590 }
2591
2592 /*
2593 * If we find a lxc.net.[i].hwaddr or lxc.network.hwaddr in the original config
2594 * file, we expand it in the unexpanded_config, so that after a save_config we
2595 * store the hwaddr for re-use.
2596 * This is only called when reading the config file, not when executing a
2597 * lxc.include.
2598 * 'x' and 'X' are substituted in-place.
2599 */
2600 static void update_hwaddr(const char *line)
2601 {
2602 char *p;
2603
2604 line += lxc_char_left_gc(line, strlen(line));
2605 if (line[0] == '#')
2606 return;
2607
2608 if (!lxc_config_net_is_hwaddr(line))
2609 return;
2610
2611 /* Let config_net_hwaddr raise the error. */
2612 p = strchr(line, '=');
2613 if (!p)
2614 return;
2615 p++;
2616
2617 while (isblank(*p))
2618 p++;
2619
2620 if (!*p)
2621 return;
2622
2623 rand_complete_hwaddr(p);
2624 }
2625
2626 int append_unexp_config_line(const char *line, struct lxc_conf *conf)
2627 {
2628 size_t linelen;
2629 size_t len = conf->unexpanded_len;
2630
2631 update_hwaddr(line);
2632
2633 linelen = strlen(line);
2634 while (conf->unexpanded_alloced <= len + linelen + 2) {
2635 char *tmp;
2636
2637 tmp = realloc(conf->unexpanded_config, conf->unexpanded_alloced + 1024);
2638 if (!tmp)
2639 return ret_errno(EINVAL);
2640
2641 if (!conf->unexpanded_config)
2642 *tmp = '\0';
2643
2644 conf->unexpanded_config = tmp;
2645 conf->unexpanded_alloced += 1024;
2646 }
2647
2648 memcpy(conf->unexpanded_config + conf->unexpanded_len, line, linelen);
2649 conf->unexpanded_len += linelen;
2650 if (line[linelen - 1] != '\n')
2651 conf->unexpanded_config[conf->unexpanded_len++] = '\n';
2652 conf->unexpanded_config[conf->unexpanded_len] = '\0';
2653
2654 return 0;
2655 }
2656
2657 static int do_includedir(const char *dirp, struct lxc_conf *lxc_conf)
2658 {
2659 __do_closedir DIR *dir = NULL;
2660 struct dirent *direntp;
2661 int len, ret;
2662
2663 dir = opendir(dirp);
2664 if (!dir)
2665 return errno == ENOENT ? 0 : -errno;
2666
2667 while ((direntp = readdir(dir))) {
2668 const char *fnam;
2669 char path[PATH_MAX];
2670
2671 fnam = direntp->d_name;
2672 if (strequal(fnam, "."))
2673 continue;
2674
2675 if (strequal(fnam, ".."))
2676 continue;
2677
2678 len = strlen(fnam);
2679 if (len < 6 || !strnequal(fnam + len - 5, ".conf", 5))
2680 continue;
2681
2682 len = strnprintf(path, sizeof(path), "%s/%s", dirp, fnam);
2683 if (len < 0)
2684 return ret_errno(EIO);
2685
2686 ret = lxc_config_read(path, lxc_conf, true);
2687 if (ret < 0)
2688 return ret;
2689 }
2690
2691 return 0;
2692 }
2693
2694 static int set_config_includefiles(const char *key, const char *value,
2695 struct lxc_conf *lxc_conf, void *data)
2696 {
2697 if (lxc_config_value_empty(value)) {
2698 clr_config_includefiles(key, lxc_conf, NULL);
2699 return 0;
2700 }
2701
2702 if (value[strlen(value)-1] == '/' || is_dir(value))
2703 return do_includedir(value, lxc_conf);
2704
2705 return lxc_config_read(value, lxc_conf, true);
2706 }
2707
2708 static int set_config_rootfs_path(const char *key, const char *value,
2709 struct lxc_conf *lxc_conf, void *data)
2710 {
2711 __do_free char *dup = NULL;
2712 int ret;
2713 char *tmp;
2714 const char *container_path;
2715
2716 if (lxc_config_value_empty(value)) {
2717 free(lxc_conf->rootfs.path);
2718 lxc_conf->rootfs.path = NULL;
2719 return 0;
2720 }
2721
2722 dup = strdup(value);
2723 if (!dup)
2724 return ret_errno(ENOMEM);
2725
2726 /* Split <storage type>:<container path> into <storage type> and
2727 * <container path>. Set "rootfs.bdev_type" to <storage type> and
2728 * "rootfs.path" to <container path>.
2729 */
2730 tmp = strchr(dup, ':');
2731 if (tmp) {
2732 *tmp = '\0';
2733
2734 ret = set_config_path_item(&lxc_conf->rootfs.bdev_type, dup);
2735 if (ret < 0)
2736 return ret_errno(ENOMEM);
2737
2738 tmp++;
2739 container_path = tmp;
2740 } else {
2741 container_path = value;
2742 }
2743
2744 return set_config_path_item(&lxc_conf->rootfs.path, container_path);
2745 }
2746
2747 static int set_config_rootfs_managed(const char *key, const char *value,
2748 struct lxc_conf *lxc_conf, void *data)
2749 {
2750 return set_config_bool_item(&lxc_conf->rootfs.managed, value, true);
2751 }
2752
2753 static int set_config_rootfs_mount(const char *key, const char *value,
2754 struct lxc_conf *lxc_conf, void *data)
2755 {
2756 return set_config_path_item(&lxc_conf->rootfs.mount, value);
2757 }
2758
2759 static int set_config_rootfs_options(const char *key, const char *value,
2760 struct lxc_conf *lxc_conf, void *data)
2761 {
2762 __do_free char *dup = NULL, *raw_options = NULL;
2763 struct lxc_rootfs *rootfs = &lxc_conf->rootfs;
2764 struct lxc_mount_options *mnt_opts = &rootfs->mnt_opts;
2765 int ret;
2766
2767 clr_config_rootfs_options(key, lxc_conf, data);
2768 if (lxc_config_value_empty(value))
2769 return 0;
2770
2771 ret = set_config_string_item(&raw_options, value);
2772 if (ret < 0)
2773 return ret_errno(ENOMEM);
2774
2775 dup = strdup(value);
2776 if (!dup)
2777 return -ENOMEM;
2778
2779 ret = parse_lxc_mount_attrs(mnt_opts, dup);
2780 if (ret < 0)
2781 return ret;
2782
2783 /* Make sure we're only valid LXC specific mount options. */
2784 if (mnt_opts->create_dir || mnt_opts->create_file ||
2785 mnt_opts->optional || mnt_opts->relative)
2786 return syserror_set(-EINVAL, "Invalid LXC specific mount option for rootfs mount");
2787
2788 ret = parse_mount_attrs(mnt_opts, dup);
2789 if (ret < 0)
2790 return ret_errno(EINVAL);
2791
2792 rootfs->mnt_opts.raw_options = move_ptr(raw_options);
2793 return 0;
2794 }
2795
2796 static int set_config_uts_name(const char *key, const char *value,
2797 struct lxc_conf *lxc_conf, void *data)
2798 {
2799 __do_free struct utsname *utsname = NULL;
2800
2801 if (lxc_config_value_empty(value)) {
2802 clr_config_uts_name(key, lxc_conf, NULL);
2803 return 0;
2804 }
2805
2806 utsname = zalloc(sizeof(*utsname));
2807 if (!utsname)
2808 return ret_errno(ENOMEM);
2809
2810 if (strlen(value) >= sizeof(utsname->nodename))
2811 return ret_errno(EINVAL);
2812
2813 (void)strlcpy(utsname->nodename, value, sizeof(utsname->nodename));
2814 free(lxc_conf->utsname);
2815 lxc_conf->utsname = move_ptr(utsname);
2816
2817 return 0;
2818 }
2819
2820 static int set_config_namespace_clone(const char *key, const char *value,
2821 struct lxc_conf *lxc_conf, void *data)
2822 {
2823 __do_free char *ns = NULL;
2824 char *token;
2825 int cloneflag = 0;
2826
2827 if (lxc_config_value_empty(value))
2828 return clr_config_namespace_clone(key, lxc_conf, data);
2829
2830 if (lxc_conf->ns_keep != 0)
2831 return log_error_errno(-EINVAL, EINVAL, "Cannot set both \"lxc.namespace.clone\" and \"lxc.namespace.keep\"");
2832
2833 ns = strdup(value);
2834 if (!ns)
2835 return ret_errno(ENOMEM);
2836
2837 lxc_iterate_parts(token, ns, " \t") {
2838 token += lxc_char_left_gc(token, strlen(token));
2839 token[lxc_char_right_gc(token, strlen(token))] = '\0';
2840 cloneflag = lxc_namespace_2_cloneflag(token);
2841 if (cloneflag < 0)
2842 return ret_errno(EINVAL);
2843 lxc_conf->ns_clone |= cloneflag;
2844 }
2845
2846 return 0;
2847 }
2848
2849 static int set_config_namespace_keep(const char *key, const char *value,
2850 struct lxc_conf *lxc_conf, void *data)
2851 {
2852 __do_free char *ns = NULL;
2853 char *token;
2854 int cloneflag = 0;
2855
2856 if (lxc_config_value_empty(value))
2857 return clr_config_namespace_keep(key, lxc_conf, data);
2858
2859 if (lxc_conf->ns_clone != 0)
2860 return log_error_errno(-EINVAL, EINVAL, "Cannot set both \"lxc.namespace.clone\" and \"lxc.namespace.keep\"");
2861
2862 ns = strdup(value);
2863 if (!ns)
2864 return ret_errno(ENOMEM);
2865
2866 lxc_iterate_parts(token, ns, " \t") {
2867 token += lxc_char_left_gc(token, strlen(token));
2868 token[lxc_char_right_gc(token, strlen(token))] = '\0';
2869 cloneflag = lxc_namespace_2_cloneflag(token);
2870 if (cloneflag < 0)
2871 return ret_errno(EINVAL);
2872 lxc_conf->ns_keep |= cloneflag;
2873 }
2874
2875 return 0;
2876 }
2877
2878 static int set_config_time_offset_boot(const char *key, const char *value,
2879 struct lxc_conf *lxc_conf, void *data)
2880 {
2881 int ret;
2882 char *unit;
2883 int64_t offset = 0;
2884 char buf[STRLITERALLEN("ms") + 1];
2885
2886 if (lxc_config_value_empty(value))
2887 return clr_config_time_offset_boot(key, lxc_conf, data);
2888
2889 ret = lxc_safe_int64_residual(value, &offset, 10, buf, sizeof(buf));
2890 if (ret)
2891 return ret;
2892
2893 unit = lxc_trim_whitespace_in_place(buf);
2894 if (strequal(unit, "h")) {
2895 if (!multiply_overflow(offset, 3600, &lxc_conf->timens.s_boot))
2896 return ret_errno(EOVERFLOW);
2897 } else if (strequal(unit, "m")) {
2898 if (!multiply_overflow(offset, 60, &lxc_conf->timens.s_boot))
2899 return ret_errno(EOVERFLOW);
2900 } else if (strequal(unit, "s")) {
2901 lxc_conf->timens.s_boot = offset;
2902 } else if (strequal(unit, "ms")) {
2903 if (!multiply_overflow(offset, 1000000, &lxc_conf->timens.ns_boot))
2904 return ret_errno(EOVERFLOW);
2905 } else if (strequal(unit, "us")) {
2906 if (!multiply_overflow(offset, 1000, &lxc_conf->timens.ns_boot))
2907 return ret_errno(EOVERFLOW);
2908 } else if (strequal(unit, "ns")) {
2909 lxc_conf->timens.ns_boot = offset;
2910 } else {
2911 return ret_errno(EINVAL);
2912 }
2913
2914 return 0;
2915 }
2916
2917 static int set_config_time_offset_monotonic(const char *key, const char *value,
2918 struct lxc_conf *lxc_conf, void *data)
2919 {
2920 int ret;
2921 char *unit;
2922 int64_t offset = 0;
2923 char buf[STRLITERALLEN("ms") + 1];
2924
2925 if (lxc_config_value_empty(value))
2926 return clr_config_time_offset_monotonic(key, lxc_conf, data);
2927
2928 ret = lxc_safe_int64_residual(value, &offset, 10, buf, sizeof(buf));
2929 if (ret)
2930 return ret;
2931
2932 unit = lxc_trim_whitespace_in_place(buf);
2933 if (strequal(unit, "h")) {
2934 if (!multiply_overflow(offset, 3600, &lxc_conf->timens.s_monotonic))
2935 return ret_errno(EOVERFLOW);
2936 } else if (strequal(unit, "m")) {
2937 if (!multiply_overflow(offset, 60, &lxc_conf->timens.s_monotonic))
2938 return ret_errno(EOVERFLOW);
2939 } else if (strequal(unit, "s")) {
2940 lxc_conf->timens.s_monotonic = offset;
2941 } else if (strequal(unit, "ms")) {
2942 if (!multiply_overflow(offset, 1000000, &lxc_conf->timens.ns_monotonic))
2943 return ret_errno(EOVERFLOW);
2944 } else if (strequal(unit, "us")) {
2945 if (!multiply_overflow(offset, 1000, &lxc_conf->timens.ns_monotonic))
2946 return ret_errno(EOVERFLOW);
2947 } else if (strequal(unit, "ns")) {
2948 lxc_conf->timens.ns_monotonic = offset;
2949 } else {
2950 return ret_errno(EINVAL);
2951 }
2952
2953 return 0;
2954 }
2955
2956 static int set_config_namespace_share(const char *key, const char *value,
2957 struct lxc_conf *lxc_conf, void *data)
2958 {
2959 int ns_idx;
2960 const char *namespace;
2961
2962 if (lxc_config_value_empty(value))
2963 return clr_config_namespace_share(key, lxc_conf, data);
2964
2965 namespace = key + STRLITERALLEN("lxc.namespace.share.");
2966 if (is_empty_string(namespace))
2967 return ret_errno(EINVAL);
2968
2969 ns_idx = lxc_namespace_2_ns_idx(namespace);
2970 if (ns_idx < 0)
2971 return ns_idx;
2972
2973 return set_config_string_item(&lxc_conf->ns_share[ns_idx], value);
2974 }
2975
2976 struct parse_line_conf {
2977 struct lxc_conf *conf;
2978 bool from_include;
2979 };
2980
2981 static int parse_line(char *buffer, void *data)
2982 {
2983 __do_free char *linep = NULL;
2984 char *dot, *key, *line, *value;
2985 bool empty_line;
2986 struct lxc_config_t *config;
2987 int ret;
2988 char *dup = buffer;
2989 struct parse_line_conf *plc = data;
2990
2991 if (!plc->conf)
2992 return syserror_set(-EINVAL, "Missing config");
2993
2994 /* If there are newlines in the config file we should keep them. */
2995 empty_line = lxc_is_line_empty(dup);
2996 if (empty_line)
2997 dup = "\n";
2998
2999 /* We have to dup the buffer otherwise, at the re-exec for reboot we
3000 * modified the original string on the stack by replacing '=' by '\0'
3001 * below.
3002 */
3003 linep = line = strdup(dup);
3004 if (!line)
3005 return ret_errno(ENOMEM);
3006
3007 if (!plc->from_include) {
3008 ret = append_unexp_config_line(line, plc->conf);
3009 if (ret < 0)
3010 return ret;
3011 }
3012
3013 if (empty_line)
3014 return 0;
3015
3016 line += lxc_char_left_gc(line, strlen(line));
3017
3018 /* ignore comments */
3019 if (line[0] == '#')
3020 return 0;
3021
3022 /* martian option - don't add it to the config itself */
3023 if (!strnequal(line, "lxc.", 4))
3024 return 0;
3025
3026 dot = strchr(line, '=');
3027 if (!dot)
3028 return log_error_errno(-EINVAL, EINVAL, "Invalid configuration line: %s", line);
3029
3030 *dot = '\0';
3031 value = dot + 1;
3032
3033 key = line;
3034 key[lxc_char_right_gc(key, strlen(key))] = '\0';
3035
3036 value += lxc_char_left_gc(value, strlen(value));
3037 value[lxc_char_right_gc(value, strlen(value))] = '\0';
3038
3039 if (*value == '\'' || *value == '\"') {
3040 size_t len;
3041
3042 len = strlen(value);
3043 if (len > 1 && value[len - 1] == *value) {
3044 value[len - 1] = '\0';
3045 value++;
3046 }
3047 }
3048
3049 config = lxc_get_config(key);
3050 return config->set(key, value, plc->conf, NULL);
3051 }
3052
3053 static struct new_config_item *parse_new_conf_line(char *buffer)
3054 {
3055 __do_free char *k = NULL, *linep = NULL, *v = NULL;
3056 __do_free struct new_config_item *new = NULL;
3057 char *dup = buffer;
3058 char *dot, *key, *line, *value;
3059
3060 if (is_empty_string(buffer))
3061 return log_error_errno(NULL, EINVAL, "Empty configuration line");
3062
3063 linep = line = strdup(dup);
3064 if (!line)
3065 return NULL;
3066
3067 line += lxc_char_left_gc(line, strlen(line));
3068
3069 /* martian option - don't add it to the config itself */
3070 if (!strnequal(line, "lxc.", 4))
3071 return 0;
3072
3073 dot = strchr(line, '=');
3074 if (!dot)
3075 return log_error_errno(NULL, EINVAL, "Invalid configuration line: %s", line);
3076
3077 *dot = '\0';
3078 value = dot + 1;
3079
3080 key = line;
3081 key[lxc_char_right_gc(key, strlen(key))] = '\0';
3082
3083 value += lxc_char_left_gc(value, strlen(value));
3084 value[lxc_char_right_gc(value, strlen(value))] = '\0';
3085
3086 if (*value == '\'' || *value == '\"') {
3087 size_t len;
3088
3089 len = strlen(value);
3090 if (len > 1 && value[len - 1] == *value) {
3091 value[len - 1] = '\0';
3092 value++;
3093 }
3094 }
3095
3096 new = zalloc(sizeof(struct new_config_item));
3097 if (!new)
3098 return NULL;
3099
3100 k = strdup(key);
3101 if (!k)
3102 return NULL;
3103
3104 v = strdup(value);
3105 if (!v)
3106 return NULL;
3107
3108 new->key = move_ptr(k);
3109 new->val = move_ptr(v);
3110 return move_ptr(new);
3111 }
3112
3113 int lxc_config_read(const char *file, struct lxc_conf *conf, bool from_include)
3114 {
3115 struct parse_line_conf plc;
3116
3117 if (!conf)
3118 return syserror_set(-EINVAL, "Missing config");
3119
3120 plc.conf = conf;
3121 plc.from_include = from_include;
3122
3123 /* Catch only the top level config file name in the structure. */
3124 if (!conf->rcfile)
3125 conf->rcfile = strdup(file);
3126
3127 return lxc_file_for_each_line_mmap(file, parse_line, &plc);
3128 }
3129
3130 int lxc_config_define_add(struct lxc_list *defines, char *arg)
3131 {
3132 __do_free struct lxc_list *dent = NULL;
3133
3134 dent = lxc_list_new();
3135 if (!dent)
3136 return ret_errno(ENOMEM);
3137
3138 dent->elem = parse_new_conf_line(arg);
3139 if (!dent->elem)
3140 return ret_errno(ENOMEM);
3141
3142 lxc_list_add_tail(defines, move_ptr(dent));
3143
3144 return 0;
3145 }
3146
3147 bool lxc_config_define_load(struct lxc_list *defines, struct lxc_container *c)
3148 {
3149 struct lxc_list *it;
3150 bool bret = true;
3151
3152 lxc_list_for_each(it, defines) {
3153 struct new_config_item *new_item = it->elem;
3154 bret = c->set_config_item(c, new_item->key, new_item->val);
3155 if (!bret)
3156 break;
3157 }
3158
3159 #ifndef FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION
3160 lxc_config_define_free(defines);
3161 #endif /* !FUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION */
3162
3163 return bret;
3164 }
3165
3166 void lxc_config_define_free(struct lxc_list *defines)
3167 {
3168 struct lxc_list *it, *next;
3169
3170 lxc_list_for_each_safe(it, defines, next) {
3171 struct new_config_item *new_item = it->elem;
3172 free(new_item->key);
3173 free(new_item->val);
3174 lxc_list_del(it);
3175 free(it->elem);
3176 free(it);
3177 }
3178 }
3179
3180 int lxc_config_parse_arch(const char *arch, signed long *persona)
3181 {
3182 static struct per_name {
3183 char *name;
3184 unsigned long per;
3185 } pername[] = {
3186 { "arm", PER_LINUX32 },
3187 { "armel", PER_LINUX32 },
3188 { "armhf", PER_LINUX32 },
3189 { "armv7l", PER_LINUX32 },
3190 { "athlon", PER_LINUX32 },
3191 { "i386", PER_LINUX32 },
3192 { "i486", PER_LINUX32 },
3193 { "i586", PER_LINUX32 },
3194 { "i686", PER_LINUX32 },
3195 { "linux32", PER_LINUX32 },
3196 { "mips", PER_LINUX32 },
3197 { "mipsel", PER_LINUX32 },
3198 { "ppc", PER_LINUX32 },
3199 { "powerpc", PER_LINUX32 },
3200 { "x86", PER_LINUX32 },
3201 { "aarch64", PER_LINUX },
3202 { "amd64", PER_LINUX },
3203 { "arm64", PER_LINUX },
3204 { "linux64", PER_LINUX },
3205 { "mips64", PER_LINUX },
3206 { "mips64el", PER_LINUX },
3207 { "ppc64", PER_LINUX },
3208 { "ppc64el", PER_LINUX },
3209 { "ppc64le", PER_LINUX },
3210 { "powerpc64", PER_LINUX },
3211 { "s390x", PER_LINUX },
3212 { "x86_64", PER_LINUX },
3213 };
3214
3215 for (int i = 0; i < ARRAY_SIZE(pername); i++) {
3216 if (!strequal(pername[i].name, arch))
3217 continue;
3218
3219 *persona = pername[i].per;
3220 return 0;
3221 }
3222
3223 return ret_errno(EINVAL);
3224 }
3225
3226 int lxc_fill_elevated_privileges(char *flaglist, unsigned int *flags)
3227 {
3228 unsigned int flags_tmp = 0;
3229 char *token;
3230 struct {
3231 const char *token;
3232 int flag;
3233 } all_privs[] = {
3234 { "CGROUP", LXC_ATTACH_MOVE_TO_CGROUP },
3235 { "CAP", LXC_ATTACH_DROP_CAPABILITIES },
3236 { "LSM", LXC_ATTACH_LSM_EXEC },
3237 { NULL, 0 }
3238 };
3239
3240 if (!flaglist) {
3241 /*
3242 * For the sake of backward compatibility, keep all privileges
3243 * if no specific privileges are specified.
3244 */
3245 for (unsigned int i = 0; all_privs[i].token; i++)
3246 flags_tmp |= all_privs[i].flag;
3247
3248 *flags = flags_tmp;
3249 return 0;
3250 }
3251
3252 lxc_iterate_parts(token, flaglist, "|") {
3253 bool valid_token = false;
3254
3255 for (unsigned int i = 0; all_privs[i].token; i++) {
3256 if (!strequal(all_privs[i].token, token))
3257 continue;
3258
3259 valid_token = true;
3260 flags_tmp |= all_privs[i].flag;
3261 }
3262
3263 if (!valid_token)
3264 return syserror_set(-EINVAL, "Invalid elevated privilege \"%s\" requested", token);
3265 }
3266
3267 *flags = flags_tmp;
3268 return 0;
3269 }
3270
3271 /* Write out a configuration file. */
3272 int write_config(int fd, const struct lxc_conf *conf)
3273 {
3274 int ret;
3275 size_t len = conf->unexpanded_len;
3276
3277 if (len == 0)
3278 return 0;
3279
3280 ret = lxc_write_nointr(fd, conf->unexpanded_config, len);
3281 if (ret < 0)
3282 return log_error_errno(-errno, errno, "Failed to write configuration file");
3283
3284 return 0;
3285 }
3286
3287 bool do_append_unexp_config_line(struct lxc_conf *conf, const char *key,
3288 const char *v)
3289 {
3290 __do_free char *tmp = NULL;
3291 int ret;
3292 size_t len;
3293
3294 len = strlen(key) + strlen(v) + 4;
3295 tmp = must_realloc(NULL, len);
3296
3297 if (lxc_config_value_empty(v))
3298 ret = strnprintf(tmp, len, "%s =", key);
3299 else
3300 ret = strnprintf(tmp, len, "%s = %s", key, v);
3301 if (ret < 0)
3302 return false;
3303
3304 /* Save the line verbatim into unexpanded_conf */
3305 if (append_unexp_config_line(tmp, conf))
3306 return false;
3307
3308 return true;
3309 }
3310
3311 void clear_unexp_config_line(struct lxc_conf *conf, const char *key,
3312 bool rm_subkeys)
3313 {
3314 char *lend;
3315 char *lstart = conf->unexpanded_config;
3316
3317 if (!conf->unexpanded_config)
3318 return;
3319
3320 while (*lstart) {
3321 lend = strchr(lstart, '\n');
3322 char v;
3323
3324 if (!lend)
3325 lend = lstart + strlen(lstart);
3326 else
3327 lend++;
3328
3329 if (!strnequal(lstart, key, strlen(key))) {
3330 lstart = lend;
3331 continue;
3332 }
3333
3334 if (!rm_subkeys) {
3335 v = lstart[strlen(key)];
3336 if (!isspace(v) && v != '=') {
3337 lstart = lend;
3338 continue;
3339 }
3340 }
3341
3342 conf->unexpanded_len -= (lend - lstart);
3343
3344 if (*lend == '\0') {
3345 *lstart = '\0';
3346 return;
3347 }
3348
3349 memmove(lstart, lend, strlen(lend) + 1);
3350 }
3351 }
3352
3353 bool clone_update_unexp_ovl_paths(struct lxc_conf *conf, const char *oldpath,
3354 const char *newpath, const char *oldname,
3355 const char *newname, const char *ovldir)
3356 {
3357 __do_free char *newdir = NULL, *olddir = NULL;
3358 char *lstart = conf->unexpanded_config;
3359 const char *key = "lxc.mount.entry";
3360 int ret;
3361 char *lend, *p, *q;
3362 size_t newdirlen, olddirlen;
3363
3364 olddirlen = strlen(ovldir) + strlen(oldpath) + strlen(oldname) + 2;
3365 olddir = must_realloc(NULL, olddirlen + 1);
3366 ret = strnprintf(olddir, olddirlen + 1, "%s=%s/%s", ovldir, oldpath, oldname);
3367 if (ret < 0)
3368 return false;
3369
3370 newdirlen = strlen(ovldir) + strlen(newpath) + strlen(newname) + 2;
3371 newdir = must_realloc(NULL, newdirlen + 1);
3372 ret = strnprintf(newdir, newdirlen + 1, "%s=%s/%s", ovldir, newpath, newname);
3373 if (ret < 0)
3374 return false;
3375
3376 if (!conf->unexpanded_config)
3377 return true;
3378
3379 while (*lstart) {
3380 lend = strchr(lstart, '\n');
3381 if (!lend)
3382 lend = lstart + strlen(lstart);
3383 else
3384 lend++;
3385
3386 if (!strnequal(lstart, key, strlen(key)))
3387 goto next;
3388
3389 p = strchr(lstart + strlen(key), '=');
3390 if (!p)
3391 goto next;
3392 p++;
3393
3394 while (isblank(*p))
3395 p++;
3396
3397 if (p >= lend)
3398 goto next;
3399
3400 /* Whenever a lxc.mount.entry entry is found in a line we check
3401 * if the substring "overlay" is present before doing any
3402 * further work. We check for "overlay" because substrings need
3403 * to have at least one space before them in a valid overlay
3404 * lxc.mount.entry (/A B overlay). When the space before is
3405 * missing it is very likely that these substrings are part of a
3406 * path or something else. (Checking q >= lend ensures that we
3407 * only count matches in the current line.) */
3408 q = strstr(p, " overlay");
3409 if (!q || q >= lend)
3410 goto next;
3411
3412 if (!(q = strstr(p, olddir)) || (q >= lend))
3413 goto next;
3414
3415 /* replace the olddir with newdir */
3416 if (olddirlen >= newdirlen) {
3417 size_t diff = olddirlen - newdirlen;
3418 memcpy(q, newdir, newdirlen);
3419
3420 if (olddirlen != newdirlen) {
3421 memmove(q + newdirlen, q + newdirlen + diff,
3422 strlen(q) - newdirlen - diff + 1);
3423 lend -= diff;
3424 conf->unexpanded_len -= diff;
3425 }
3426 } else {
3427 char *new;
3428 size_t diff = newdirlen - olddirlen;
3429 size_t oldlen = conf->unexpanded_len;
3430 size_t newlen = oldlen + diff;
3431 size_t poffset = q - conf->unexpanded_config;
3432
3433 new = realloc(conf->unexpanded_config, newlen + 1);
3434 if (!new)
3435 return false;
3436
3437 conf->unexpanded_len = newlen;
3438 conf->unexpanded_alloced = newlen + 1;
3439 new[newlen - 1] = '\0';
3440 lend = new + (lend - conf->unexpanded_config);
3441
3442 /* Move over the remainder to make room for the newdir.
3443 */
3444 memmove(new + poffset + newdirlen,
3445 new + poffset + olddirlen,
3446 oldlen - poffset - olddirlen + 1);
3447 conf->unexpanded_config = new;
3448
3449 memcpy(new + poffset, newdir, newdirlen);
3450 lend += diff;
3451 }
3452
3453 next:
3454 lstart = lend;
3455 }
3456
3457 return true;
3458 }
3459
3460 bool clone_update_unexp_hooks(struct lxc_conf *conf, const char *oldpath,
3461 const char *newpath, const char *oldname,
3462 const char *newname)
3463 {
3464 __do_free char *newdir = NULL, *olddir = NULL;
3465 char *lstart = conf->unexpanded_config;
3466 const char *key = "lxc.hook";
3467 int ret;
3468 char *lend, *p;
3469 size_t newdirlen, olddirlen;
3470
3471 olddirlen = strlen(oldpath) + strlen(oldname) + 1;
3472 olddir = must_realloc(NULL, olddirlen + 1);
3473 ret = strnprintf(olddir, olddirlen + 1, "%s/%s", oldpath, oldname);
3474 if (ret < 0)
3475 return false;
3476
3477 newdirlen = strlen(newpath) + strlen(newname) + 1;
3478 newdir = must_realloc(NULL, newdirlen + 1);
3479 ret = strnprintf(newdir, newdirlen + 1, "%s/%s", newpath, newname);
3480 if (ret < 0)
3481 return false;
3482
3483 if (!conf->unexpanded_config)
3484 return true;
3485
3486 while (*lstart) {
3487 lend = strchr(lstart, '\n');
3488 if (!lend)
3489 lend = lstart + strlen(lstart);
3490 else
3491 lend++;
3492
3493 if (!strnequal(lstart, key, strlen(key)))
3494 goto next;
3495
3496 p = strchr(lstart + strlen(key), '=');
3497 if (!p)
3498 goto next;
3499 p++;
3500
3501 while (isblank(*p))
3502 p++;
3503
3504 if (p >= lend)
3505 goto next;
3506
3507 if (!strnequal(p, olddir, strlen(olddir)))
3508 goto next;
3509
3510 /* replace the olddir with newdir */
3511 if (olddirlen >= newdirlen) {
3512 size_t diff = olddirlen - newdirlen;
3513 memcpy(p, newdir, newdirlen);
3514
3515 if (olddirlen != newdirlen) {
3516 memmove(p + newdirlen, p + newdirlen + diff,
3517 strlen(p) - newdirlen - diff + 1);
3518 lend -= diff;
3519 conf->unexpanded_len -= diff;
3520 }
3521 } else {
3522 char *new;
3523 size_t diff = newdirlen - olddirlen;
3524 size_t oldlen = conf->unexpanded_len;
3525 size_t newlen = oldlen + diff;
3526 size_t poffset = p - conf->unexpanded_config;
3527
3528 new = realloc(conf->unexpanded_config, newlen + 1);
3529 if (!new)
3530 return false;
3531
3532 conf->unexpanded_len = newlen;
3533 conf->unexpanded_alloced = newlen + 1;
3534 new[newlen - 1] = '\0';
3535 lend = new + (lend - conf->unexpanded_config);
3536
3537 /* Move over the remainder to make room for the newdir.
3538 */
3539 memmove(new + poffset + newdirlen,
3540 new + poffset + olddirlen,
3541 oldlen - poffset - olddirlen + 1);
3542 conf->unexpanded_config = new;
3543
3544 memcpy(new + poffset, newdir, newdirlen);
3545 lend += diff;
3546 }
3547
3548 next:
3549 lstart = lend;
3550 }
3551
3552 return true;
3553 }
3554
3555 #define DO(cmd) \
3556 { \
3557 if (!(cmd)) { \
3558 ERROR("Error writing to new config"); \
3559 return false; \
3560 } \
3561 }
3562
3563 /* This is called only from clone. We wish to update all hwaddrs in the
3564 * unexpanded config file. We can't/don't want to update any which come from
3565 * lxc.includes (there shouldn't be any).
3566 * We can't just walk the c->lxc-conf->network list because that includes netifs
3567 * from the include files. So we update the ones which we find in the unexp
3568 * config file, then find the original macaddr in the conf->network, and update
3569 * that to the same value.
3570 */
3571 bool network_new_hwaddrs(struct lxc_conf *conf)
3572 {
3573 char *lend, *p, *p2;
3574 char *lstart = conf->unexpanded_config;
3575
3576 if (!conf->unexpanded_config)
3577 return true;
3578
3579 while (*lstart) {
3580 char newhwaddr[18], oldhwaddr[17];
3581 struct lxc_netdev *netdev;
3582
3583 lend = strchr(lstart, '\n');
3584 if (!lend)
3585 lend = lstart + strlen(lstart);
3586 else
3587 lend++;
3588
3589 if (!lxc_config_net_is_hwaddr(lstart)) {
3590 lstart = lend;
3591 continue;
3592 }
3593
3594 p = strchr(lstart, '=');
3595 if (!p) {
3596 lstart = lend;
3597 continue;
3598 }
3599
3600 p++;
3601 while (isblank(*p))
3602 p++;
3603 if (!*p)
3604 return true;
3605
3606 p2 = p;
3607 while (*p2 && !isblank(*p2) && *p2 != '\n')
3608 p2++;
3609
3610 if ((p2 - p) != 17) {
3611 WARN("Bad hwaddr entry");
3612 lstart = lend;
3613 continue;
3614 }
3615
3616 memcpy(oldhwaddr, p, 17);
3617
3618 if (!new_hwaddr(newhwaddr))
3619 return false;
3620
3621 memcpy(p, newhwaddr, 17);
3622 list_for_each_entry(netdev, &conf->netdevs, head) {
3623 if (netdev->hwaddr && memcmp(oldhwaddr, netdev->hwaddr, 17) == 0)
3624 memcpy(netdev->hwaddr, newhwaddr, 17);
3625 }
3626
3627 lstart = lend;
3628 }
3629
3630 return true;
3631 }
3632
3633 static int set_config_ephemeral(const char *key, const char *value,
3634 struct lxc_conf *lxc_conf, void *data)
3635 {
3636 int ret;
3637
3638 if (lxc_config_value_empty(value)) {
3639 lxc_conf->ephemeral = 0;
3640 return 0;
3641 }
3642
3643 ret = lxc_safe_uint(value, &lxc_conf->ephemeral);
3644 if (ret < 0)
3645 return ret;
3646
3647 if (lxc_conf->ephemeral > 1)
3648 return ret_errno(EINVAL);
3649
3650 return 0;
3651 }
3652
3653 static int set_config_log_syslog(const char *key, const char *value,
3654 struct lxc_conf *lxc_conf, void *data)
3655 {
3656 int facility;
3657
3658 if (lxc_conf->syslog)
3659 free_disarm(lxc_conf->syslog);
3660
3661 if (lxc_config_value_empty(value))
3662 return 0;
3663
3664 facility = lxc_syslog_priority_to_int(value);
3665 if (facility == -EINVAL)
3666 return ret_errno(EINVAL);
3667
3668 lxc_log_syslog(facility);
3669
3670 return set_config_string_item(&lxc_conf->syslog, value);
3671 }
3672
3673 static int set_config_no_new_privs(const char *key, const char *value,
3674 struct lxc_conf *lxc_conf, void *data)
3675 {
3676 int ret;
3677 unsigned int v;
3678
3679 if (lxc_config_value_empty(value)) {
3680 lxc_conf->no_new_privs = false;
3681 return 0;
3682 }
3683
3684 ret = lxc_safe_uint(value, &v);
3685 if (ret < 0)
3686 return ret;
3687
3688 if (v > 1)
3689 return ret_errno(EINVAL);
3690
3691 lxc_conf->no_new_privs = v ? true : false;
3692
3693 return 0;
3694 }
3695
3696 /* Callbacks to get configuration items. */
3697 static int get_config_personality(const char *key, char *retv, int inlen,
3698 struct lxc_conf *c, void *data)
3699 {
3700 int fulllen = 0;
3701
3702 if (!retv)
3703 inlen = 0;
3704 else
3705 memset(retv, 0, inlen);
3706
3707 int len = 0;
3708
3709 switch (c->personality) {
3710 case PER_LINUX32:
3711 strprint(retv, inlen, "i686");
3712 break;
3713 case PER_LINUX:
3714 strprint(retv, inlen, "x86_64");
3715 break;
3716 default:
3717 break;
3718 }
3719
3720 return fulllen;
3721 }
3722
3723 static int get_config_pty_max(const char *key, char *retv, int inlen,
3724 struct lxc_conf *c, void *data)
3725 {
3726 return lxc_get_conf_size_t(c, retv, inlen, c->pty_max);
3727 }
3728
3729 static int get_config_tty_max(const char *key, char *retv, int inlen,
3730 struct lxc_conf *c, void *data)
3731 {
3732 return lxc_get_conf_size_t(c, retv, inlen, c->ttys.max);
3733 }
3734
3735 static int get_config_tty_dir(const char *key, char *retv, int inlen,
3736 struct lxc_conf *c, void *data)
3737 {
3738 return lxc_get_conf_str(retv, inlen, c->ttys.dir);
3739 }
3740
3741 static int get_config_apparmor_profile(const char *key, char *retv, int inlen,
3742 struct lxc_conf *c, void *data)
3743 {
3744 #if HAVE_APPARMOR
3745 return lxc_get_conf_str(retv, inlen, c->lsm_aa_profile);
3746 #else
3747 return syserror_set(-EINVAL, "Built without AppArmor support");
3748 #endif
3749 }
3750
3751 static int get_config_apparmor_allow_incomplete(const char *key, char *retv,
3752 int inlen, struct lxc_conf *c,
3753 void *data)
3754 {
3755 #if HAVE_APPARMOR
3756 return lxc_get_conf_int(c, retv, inlen, c->lsm_aa_allow_incomplete);
3757 #else
3758 return syserror_set(-EINVAL, "Built without AppArmor support");
3759 #endif
3760 }
3761
3762 static int get_config_apparmor_allow_nesting(const char *key, char *retv,
3763 int inlen, struct lxc_conf *c,
3764 void *data)
3765 {
3766 #if HAVE_APPARMOR
3767 return lxc_get_conf_int(c, retv, inlen, c->lsm_aa_allow_nesting);
3768 #else
3769 return syserror_set(-EINVAL, "Built without AppArmor support");
3770 #endif
3771 }
3772
3773 static int get_config_apparmor_raw(const char *key, char *retv,
3774 int inlen, struct lxc_conf *c,
3775 void *data)
3776 {
3777 #if HAVE_APPARMOR
3778 int len;
3779 struct lxc_list *it;
3780 int fulllen = 0;
3781
3782 if (!retv)
3783 inlen = 0;
3784 else
3785 memset(retv, 0, inlen);
3786
3787 lxc_list_for_each(it, &c->lsm_aa_raw) {
3788 strprint(retv, inlen, "%s\n", (char *)it->elem);
3789 }
3790
3791 return fulllen;
3792 #else
3793 return syserror_set(-EINVAL, "Built without AppArmor support");
3794 #endif
3795 }
3796
3797 static int get_config_selinux_context(const char *key, char *retv, int inlen,
3798 struct lxc_conf *c, void *data)
3799 {
3800 #if HAVE_SELINUX
3801 return lxc_get_conf_str(retv, inlen, c->lsm_se_context);
3802 #else
3803 return syserror_set(-EINVAL, "Built without SELinux support");
3804 #endif
3805 }
3806
3807 static int get_config_selinux_context_keyring(const char *key, char *retv, int inlen,
3808 struct lxc_conf *c, void *data)
3809 {
3810 #if HAVE_SELINUX
3811 return lxc_get_conf_str(retv, inlen, c->lsm_se_keyring_context);
3812 #else
3813 return syserror_set(-EINVAL, "Built without SELinux support");
3814 #endif
3815 }
3816
3817 static int get_config_keyring_session(const char *key, char *retv, int inlen,
3818 struct lxc_conf *c, void *data)
3819 {
3820 return lxc_get_conf_bool(c, retv, inlen, c->keyring_disable_session);
3821 }
3822
3823
3824 /* If you ask for a specific cgroup value, i.e. lxc.cgroup.devices.list, then
3825 * just the value(s) will be printed. Since there still could be more than one,
3826 * it is newline-separated.
3827 * (Maybe that's ambiguous, since some values, i.e. devices.list, will already
3828 * have newlines?)
3829 * If you ask for 'lxc.cgroup", then all cgroup entries will be printed, in
3830 * 'lxc.cgroup.subsystem.key = value' format.
3831 */
3832 static int __get_config_cgroup_controller(const char *key, char *retv,
3833 int inlen, struct lxc_conf *c,
3834 int version)
3835 {
3836 int fulllen = 0;
3837 bool get_all = false;
3838 int len;
3839 size_t namespaced_token_len;
3840 char *global_token, *namespaced_token;
3841 struct list_head *list;
3842 struct lxc_cgroup *cgroup;
3843
3844 if (!retv)
3845 inlen = 0;
3846 else
3847 memset(retv, 0, inlen);
3848
3849 if (version == CGROUP2_SUPER_MAGIC) {
3850 global_token = "lxc.cgroup2";
3851 namespaced_token = "lxc.cgroup2.";
3852 namespaced_token_len = STRLITERALLEN("lxc.cgroup2.");
3853 list = &c->cgroup2;
3854 } else if (version == CGROUP_SUPER_MAGIC) {
3855 global_token = "lxc.cgroup";
3856 namespaced_token = "lxc.cgroup.";
3857 namespaced_token_len = STRLITERALLEN("lxc.cgroup.");
3858 list = &c->cgroup;
3859 } else {
3860 return ret_errno(EINVAL);
3861 }
3862
3863 if (strequal(key, global_token))
3864 get_all = true;
3865 else if (strnequal(key, namespaced_token, namespaced_token_len))
3866 key += namespaced_token_len;
3867 else
3868 return ret_errno(EINVAL);
3869
3870 list_for_each_entry(cgroup, list, head) {
3871 if (get_all) {
3872 if (version != cgroup->version)
3873 continue;
3874
3875 strprint(retv, inlen, "%s.%s = %s\n", global_token,
3876 cgroup->subsystem, cgroup->value);
3877 } else if (strequal(cgroup->subsystem, key)) {
3878 strprint(retv, inlen, "%s\n", cgroup->value);
3879 }
3880 }
3881
3882 return fulllen;
3883 }
3884
3885 static int get_config_cgroup_controller(const char *key, char *retv, int inlen,
3886 struct lxc_conf *c, void *data)
3887 {
3888 return __get_config_cgroup_controller(key, retv, inlen, c,
3889 CGROUP_SUPER_MAGIC);
3890 }
3891
3892 static int get_config_cgroup2_controller(const char *key, char *retv, int inlen,
3893 struct lxc_conf *c, void *data)
3894 {
3895 return __get_config_cgroup_controller(key, retv, inlen, c,
3896 CGROUP2_SUPER_MAGIC);
3897 }
3898
3899 static int get_config_cgroup_dir(const char *key, char *retv, int inlen,
3900 struct lxc_conf *lxc_conf, void *data)
3901 {
3902 int len;
3903 int fulllen = 0;
3904
3905 if (!strequal(key, "lxc.cgroup.dir"))
3906 return ret_errno(EINVAL);
3907
3908 if (!retv)
3909 inlen = 0;
3910 else
3911 memset(retv, 0, inlen);
3912
3913 strprint(retv, inlen, "%s", lxc_conf->cgroup_meta.dir);
3914
3915 return fulllen;
3916 }
3917
3918 static int get_config_cgroup_monitor_dir(const char *key, char *retv, int inlen,
3919 struct lxc_conf *lxc_conf, void *data)
3920 {
3921 int len;
3922 int fulllen = 0;
3923
3924 if (!retv)
3925 inlen = 0;
3926 else
3927 memset(retv, 0, inlen);
3928
3929 strprint(retv, inlen, "%s", lxc_conf->cgroup_meta.monitor_dir);
3930
3931 return fulllen;
3932 }
3933
3934 static int get_config_cgroup_monitor_pivot_dir(const char *key, char *retv, int inlen,
3935 struct lxc_conf *lxc_conf, void *data)
3936 {
3937 int len;
3938 int fulllen = 0;
3939
3940 if (!retv)
3941 inlen = 0;
3942 else
3943 memset(retv, 0, inlen);
3944
3945 strprint(retv, inlen, "%s", lxc_conf->cgroup_meta.monitor_pivot_dir);
3946
3947 return fulllen;
3948 }
3949
3950 static int get_config_cgroup_container_dir(const char *key, char *retv,
3951 int inlen,
3952 struct lxc_conf *lxc_conf,
3953 void *data)
3954 {
3955 int len;
3956 int fulllen = 0;
3957
3958 if (!retv)
3959 inlen = 0;
3960 else
3961 memset(retv, 0, inlen);
3962
3963 strprint(retv, inlen, "%s", lxc_conf->cgroup_meta.container_dir);
3964
3965 return fulllen;
3966 }
3967
3968 static int get_config_cgroup_container_inner_dir(const char *key, char *retv,
3969 int inlen,
3970 struct lxc_conf *lxc_conf,
3971 void *data)
3972 {
3973 int len;
3974 int fulllen = 0;
3975
3976 if (!retv)
3977 inlen = 0;
3978 else
3979 memset(retv, 0, inlen);
3980
3981 strprint(retv, inlen, "%s", lxc_conf->cgroup_meta.namespace_dir);
3982
3983 return fulllen;
3984 }
3985
3986 static inline int get_config_cgroup_relative(const char *key, char *retv,
3987 int inlen, struct lxc_conf *lxc_conf,
3988 void *data)
3989 {
3990 return lxc_get_conf_int(lxc_conf, retv, inlen,
3991 lxc_conf->cgroup_meta.relative);
3992 }
3993
3994 static int get_config_idmaps(const char *key, char *retv, int inlen,
3995 struct lxc_conf *c, void *data)
3996 {
3997 struct id_map *map;
3998 int len, listlen, ret;
3999 int fulllen = 0;
4000 /* "u 1000 1000000 65536"
4001 *
4002 * let's render this as
4003 *
4004 * sizeof(char)
4005 * +
4006 * sizeof(" ")
4007 * +
4008 * sizeof(uint32_t)
4009 * +
4010 * sizeof(" ")
4011 * +
4012 * sizeof(uint32_t)
4013 * +
4014 * sizeof(" ")
4015 * +
4016 * sizeof(uint32_t)
4017 * +
4018 * \0
4019 */
4020 #define __LXC_IDMAP_STR_BUF (3 * INTTYPE_TO_STRLEN(uint32_t) + 3 + 1 + 1)
4021 char buf[__LXC_IDMAP_STR_BUF];
4022
4023 if (!retv)
4024 inlen = 0;
4025 else
4026 memset(retv, 0, inlen);
4027
4028 listlen = list_len(&c->id_map);
4029 list_for_each_entry(map, &c->id_map, head) {
4030 ret = strnprintf(buf, sizeof(buf), "%c %lu %lu %lu",
4031 (map->idtype == ID_TYPE_UID) ? 'u' : 'g',
4032 map->nsid, map->hostid, map->range);
4033 if (ret < 0)
4034 return ret_errno(EIO);
4035
4036 strprint(retv, inlen, "%s%s", buf, (listlen-- > 1) ? "\n" : "");
4037 }
4038
4039 return fulllen;
4040 }
4041
4042 static int get_config_log_level(const char *key, char *retv, int inlen,
4043 struct lxc_conf *c, void *data)
4044 {
4045 const char *v;
4046 v = lxc_log_priority_to_string(c->loglevel);
4047 return lxc_get_conf_str(retv, inlen, v);
4048 }
4049
4050 static int get_config_log_file(const char *key, char *retv, int inlen,
4051 struct lxc_conf *c, void *data)
4052 {
4053 return lxc_get_conf_str(retv, inlen, c->logfile);
4054 }
4055
4056 static int get_config_mount_fstab(const char *key, char *retv, int inlen,
4057 struct lxc_conf *c, void *data)
4058 {
4059 return lxc_get_conf_str(retv, inlen, c->fstab);
4060 }
4061
4062 static int get_config_mount_auto(const char *key, char *retv, int inlen,
4063 struct lxc_conf *c, void *data)
4064 {
4065 int len, fulllen = 0;
4066 const char *sep = "";
4067
4068 if (!retv)
4069 inlen = 0;
4070 else
4071 memset(retv, 0, inlen);
4072
4073 if (!(c->auto_mounts & LXC_AUTO_ALL_MASK))
4074 return 0;
4075
4076 switch (c->auto_mounts & LXC_AUTO_PROC_MASK) {
4077 case LXC_AUTO_PROC_MIXED:
4078 strprint(retv, inlen, "%sproc:mixed", sep);
4079 sep = " ";
4080 break;
4081 case LXC_AUTO_PROC_RW:
4082 strprint(retv, inlen, "%sproc:rw", sep);
4083 sep = " ";
4084 break;
4085 default:
4086 break;
4087 }
4088
4089 switch (c->auto_mounts & LXC_AUTO_SYS_MASK) {
4090 case LXC_AUTO_SYS_RO:
4091 strprint(retv, inlen, "%ssys:ro", sep);
4092 sep = " ";
4093 break;
4094 case LXC_AUTO_SYS_RW:
4095 strprint(retv, inlen, "%ssys:rw", sep);
4096 sep = " ";
4097 break;
4098 case LXC_AUTO_SYS_MIXED:
4099 strprint(retv, inlen, "%ssys:mixed", sep);
4100 sep = " ";
4101 break;
4102 default:
4103 break;
4104 }
4105
4106 switch (c->auto_mounts & LXC_AUTO_CGROUP_MASK) {
4107 case LXC_AUTO_CGROUP_NOSPEC:
4108 strprint(retv, inlen, "%scgroup", sep);
4109 break;
4110 case LXC_AUTO_CGROUP_MIXED:
4111 strprint(retv, inlen, "%scgroup:mixed", sep);
4112 break;
4113 case LXC_AUTO_CGROUP_RO:
4114 strprint(retv, inlen, "%scgroup:ro", sep);
4115 break;
4116 case LXC_AUTO_CGROUP_RW:
4117 strprint(retv, inlen, "%scgroup:rw", sep);
4118 break;
4119 case LXC_AUTO_CGROUP_FULL_NOSPEC:
4120 strprint(retv, inlen, "%scgroup-full", sep);
4121 break;
4122 case LXC_AUTO_CGROUP_FULL_MIXED:
4123 strprint(retv, inlen, "%scgroup-full:mixed", sep);
4124 break;
4125 case LXC_AUTO_CGROUP_FULL_RO:
4126 strprint(retv, inlen, "%scgroup-full:ro", sep);
4127 break;
4128 case LXC_AUTO_CGROUP_FULL_RW:
4129 strprint(retv, inlen, "%scgroup-full:rw", sep);
4130 break;
4131 default:
4132 break;
4133 }
4134
4135 return fulllen;
4136 }
4137
4138 static int get_config_mount(const char *key, char *retv, int inlen,
4139 struct lxc_conf *c, void *data)
4140 {
4141 int len, fulllen = 0;
4142 struct lxc_list *it;
4143
4144 if (!retv)
4145 inlen = 0;
4146 else
4147 memset(retv, 0, inlen);
4148
4149 lxc_list_for_each(it, &c->mount_list) {
4150 strprint(retv, inlen, "%s\n", (char *)it->elem);
4151 }
4152
4153 return fulllen;
4154 }
4155
4156 static int get_config_rootfs_path(const char *key, char *retv, int inlen,
4157 struct lxc_conf *c, void *data)
4158 {
4159 return lxc_get_conf_str(retv, inlen, c->rootfs.path);
4160 }
4161
4162 static int get_config_rootfs_managed(const char *key, char *retv, int inlen,
4163 struct lxc_conf *c, void *data)
4164 {
4165 return lxc_get_conf_bool(c, retv, inlen, c->rootfs.managed);
4166 }
4167
4168 static int get_config_rootfs_mount(const char *key, char *retv, int inlen,
4169 struct lxc_conf *c, void *data)
4170 {
4171 return lxc_get_conf_str(retv, inlen, c->rootfs.mount);
4172 }
4173
4174 static int get_config_rootfs_options(const char *key, char *retv, int inlen,
4175 struct lxc_conf *c, void *data)
4176 {
4177 return lxc_get_conf_str(retv, inlen, c->rootfs.mnt_opts.raw_options);
4178 }
4179
4180 static int get_config_uts_name(const char *key, char *retv, int inlen,
4181 struct lxc_conf *c, void *data)
4182 {
4183 return lxc_get_conf_str(
4184 retv, inlen,
4185 c->utsname ? c->utsname->nodename : NULL);
4186 }
4187
4188 static int get_config_hooks(const char *key, char *retv, int inlen,
4189 struct lxc_conf *c, void *data)
4190 {
4191 char *subkey;
4192 int len, fulllen = 0, found = -1;
4193 struct lxc_list *it;
4194 int i;
4195
4196 subkey = strchr(key, '.');
4197 if (!subkey)
4198 return ret_errno(EINVAL);
4199
4200 subkey = strchr(subkey + 1, '.');
4201 if (!subkey)
4202 return ret_errno(EINVAL);
4203 subkey++;
4204 if (*subkey == '\0')
4205 return ret_errno(EINVAL);
4206
4207 for (i = 0; i < NUM_LXC_HOOKS; i++) {
4208 if (strequal(lxchook_names[i], subkey)) {
4209 found = i;
4210 break;
4211 }
4212 }
4213
4214 if (found == -1)
4215 return ret_errno(EINVAL);
4216
4217 if (!retv)
4218 inlen = 0;
4219 else
4220 memset(retv, 0, inlen);
4221
4222 lxc_list_for_each(it, &c->hooks[found]) {
4223 strprint(retv, inlen, "%s\n", (char *)it->elem);
4224 }
4225
4226 return fulllen;
4227 }
4228
4229 static int get_config_hooks_version(const char *key, char *retv, int inlen,
4230 struct lxc_conf *c, void *data)
4231 {
4232 return lxc_get_conf_int(c, retv, inlen, c->hooks_version);
4233 }
4234
4235 static int get_config_net(const char *key, char *retv, int inlen,
4236 struct lxc_conf *c, void *data)
4237 {
4238 int len, fulllen = 0;
4239 struct lxc_netdev *netdev;
4240
4241 if (!retv)
4242 inlen = 0;
4243 else
4244 memset(retv, 0, inlen);
4245
4246 list_for_each_entry(netdev, &c->netdevs, head) {
4247 const char *t = lxc_net_type_to_str(netdev->type);
4248 strprint(retv, inlen, "%s\n", t ? t : "(invalid)");
4249 }
4250
4251 return fulllen;
4252 }
4253
4254 static int get_config_cap_drop(const char *key, char *retv, int inlen,
4255 struct lxc_conf *c, void *data)
4256 {
4257 int len, fulllen = 0;
4258 struct lxc_list *it;
4259
4260 if (!retv)
4261 inlen = 0;
4262 else
4263 memset(retv, 0, inlen);
4264
4265 lxc_list_for_each(it, &c->caps) {
4266 strprint(retv, inlen, "%s\n", (char *)it->elem);
4267 }
4268
4269 return fulllen;
4270 }
4271
4272 static int get_config_cap_keep(const char *key, char *retv, int inlen,
4273 struct lxc_conf *c, void *data)
4274 {
4275 int len, fulllen = 0;
4276 struct lxc_list *it;
4277
4278 if (!retv)
4279 inlen = 0;
4280 else
4281 memset(retv, 0, inlen);
4282
4283 lxc_list_for_each(it, &c->keepcaps) {
4284 strprint(retv, inlen, "%s\n", (char *)it->elem);
4285 }
4286
4287 return fulllen;
4288 }
4289
4290 static int get_config_console_path(const char *key, char *retv, int inlen,
4291 struct lxc_conf *c, void *data)
4292 {
4293 return lxc_get_conf_str(retv, inlen, c->console.path);
4294 }
4295
4296 static int get_config_console_logfile(const char *key, char *retv, int inlen,
4297 struct lxc_conf *c, void *data)
4298 {
4299 return lxc_get_conf_str(retv, inlen, c->console.log_path);
4300 }
4301
4302 static int get_config_console_rotate(const char *key, char *retv, int inlen,
4303 struct lxc_conf *c, void *data)
4304 {
4305 return lxc_get_conf_int(c, retv, inlen, c->console.log_rotate);
4306 }
4307
4308
4309 static int get_config_console_buffer_size(const char *key, char *retv,
4310 int inlen, struct lxc_conf *c,
4311 void *data)
4312 {
4313 return lxc_get_conf_uint64(c, retv, inlen, c->console.buffer_size);
4314 }
4315
4316 static int get_config_console_size(const char *key, char *retv, int inlen,
4317 struct lxc_conf *c, void *data)
4318 {
4319 return lxc_get_conf_uint64(c, retv, inlen, c->console.log_size);
4320 }
4321
4322 static int get_config_seccomp_allow_nesting(const char *key, char *retv,
4323 int inlen, struct lxc_conf *c,
4324 void *data)
4325 {
4326 #ifdef HAVE_SECCOMP
4327 return lxc_get_conf_int(c, retv, inlen, c->seccomp.allow_nesting);
4328 #else
4329 return ret_errno(ENOSYS);
4330 #endif
4331 }
4332
4333 static int get_config_seccomp_notify_cookie(const char *key, char *retv, int inlen,
4334 struct lxc_conf *c, void *data)
4335 {
4336 #ifdef HAVE_SECCOMP_NOTIFY
4337 return lxc_get_conf_str(retv, inlen, c->seccomp.notifier.cookie);
4338 #else
4339 return ret_errno(ENOSYS);
4340 #endif
4341 }
4342
4343 static int get_config_seccomp_notify_proxy(const char *key, char *retv, int inlen,
4344 struct lxc_conf *c, void *data)
4345 {
4346 #ifdef HAVE_SECCOMP_NOTIFY
4347 return lxc_get_conf_str(retv, inlen,
4348 (c->seccomp.notifier.proxy_addr.sun_path[0]) == '/'
4349 ? &c->seccomp.notifier.proxy_addr.sun_path[0]
4350 : &c->seccomp.notifier.proxy_addr.sun_path[1]);
4351 #else
4352 return ret_errno(ENOSYS);
4353 #endif
4354 }
4355
4356 static int get_config_seccomp_profile(const char *key, char *retv, int inlen,
4357 struct lxc_conf *c, void *data)
4358 {
4359 #ifdef HAVE_SECCOMP
4360 return lxc_get_conf_str(retv, inlen, c->seccomp.seccomp);
4361 #else
4362 return ret_errno(ENOSYS);
4363 #endif
4364 }
4365
4366 static int get_config_autodev(const char *key, char *retv, int inlen,
4367 struct lxc_conf *c, void *data)
4368 {
4369 return lxc_get_conf_int(c, retv, inlen, c->autodev);
4370 }
4371
4372 static int get_config_autodev_tmpfs_size(const char *key, char *retv, int inlen,
4373 struct lxc_conf *c, void *data)
4374 {
4375 return lxc_get_conf_int(c, retv, inlen, c->autodevtmpfssize);
4376 }
4377
4378 static int get_config_signal_halt(const char *key, char *retv, int inlen,
4379 struct lxc_conf *c, void *data)
4380 {
4381 return lxc_get_conf_int(c, retv, inlen, c->haltsignal);
4382 }
4383
4384 static int get_config_signal_reboot(const char *key, char *retv, int inlen,
4385 struct lxc_conf *c, void *data)
4386 {
4387 return lxc_get_conf_int(c, retv, inlen, c->rebootsignal);
4388 }
4389
4390 static int get_config_signal_stop(const char *key, char *retv, int inlen,
4391 struct lxc_conf *c, void *data)
4392 {
4393 return lxc_get_conf_int(c, retv, inlen, c->stopsignal);
4394 }
4395
4396 static int get_config_start(const char *key, char *retv, int inlen,
4397 struct lxc_conf *c, void *data)
4398 {
4399 if (strequal(key + 10, "auto"))
4400 return lxc_get_conf_int(c, retv, inlen, c->start_auto);
4401 else if (strequal(key + 10, "delay"))
4402 return lxc_get_conf_int(c, retv, inlen, c->start_delay);
4403 else if (strequal(key + 10, "order"))
4404 return lxc_get_conf_int(c, retv, inlen, c->start_order);
4405
4406 return ret_errno(EINVAL);
4407 }
4408
4409 static int get_config_log_syslog(const char *key, char *retv, int inlen,
4410 struct lxc_conf *c, void *data)
4411 {
4412 return lxc_get_conf_str(retv, inlen, c->syslog);
4413 }
4414
4415 static int get_config_monitor(const char *key, char *retv, int inlen,
4416 struct lxc_conf *c, void *data)
4417 {
4418 return lxc_get_conf_int(c, retv, inlen, c->monitor_unshare);
4419 }
4420
4421 static int get_config_monitor_signal_pdeath(const char *key, char *retv,
4422 int inlen, struct lxc_conf *c,
4423 void *data)
4424 {
4425 return lxc_get_conf_int(c, retv, inlen, c->monitor_signal_pdeath);
4426 }
4427
4428 static int get_config_group(const char *key, char *retv, int inlen,
4429 struct lxc_conf *c, void *data)
4430 {
4431 int len, fulllen = 0;
4432 struct lxc_list *it;
4433
4434 if (!retv)
4435 inlen = 0;
4436 else
4437 memset(retv, 0, inlen);
4438
4439 lxc_list_for_each(it, &c->groups) {
4440 strprint(retv, inlen, "%s\n", (char *)it->elem);
4441 }
4442
4443 return fulllen;
4444 }
4445
4446 static int get_config_environment(const char *key, char *retv, int inlen,
4447 struct lxc_conf *c, void *data)
4448 {
4449 int len, fulllen = 0;
4450 struct environment_entry *env;
4451
4452 if (!retv)
4453 inlen = 0;
4454 else
4455 memset(retv, 0, inlen);
4456
4457 list_for_each_entry(env, &c->environment, head) {
4458 strprint(retv, inlen, "%s=%s\n", env->key, env->val);
4459 }
4460
4461 return fulllen;
4462 }
4463
4464 static int get_config_execute_cmd(const char *key, char *retv, int inlen,
4465 struct lxc_conf *c, void *data)
4466 {
4467 return lxc_get_conf_str(retv, inlen, c->execute_cmd);
4468 }
4469
4470 static int get_config_init_cmd(const char *key, char *retv, int inlen,
4471 struct lxc_conf *c, void *data)
4472 {
4473 return lxc_get_conf_str(retv, inlen, c->init_cmd);
4474 }
4475
4476 static int get_config_init_cwd(const char *key, char *retv, int inlen,
4477 struct lxc_conf *c, void *data)
4478 {
4479 return lxc_get_conf_str(retv, inlen, c->init_cwd);
4480 }
4481
4482 static int get_config_init_uid(const char *key, char *retv, int inlen,
4483 struct lxc_conf *c, void *data)
4484 {
4485 return lxc_get_conf_int(c, retv, inlen, c->init_uid);
4486 }
4487
4488 static int get_config_init_gid(const char *key, char *retv, int inlen,
4489 struct lxc_conf *c, void *data)
4490 {
4491 return lxc_get_conf_int(c, retv, inlen, c->init_gid);
4492 }
4493
4494 static int get_config_init_groups(const char *key, char *retv, int inlen,
4495 struct lxc_conf *c, void *data)
4496 {
4497 int fulllen = 0, len;
4498
4499 if (!retv)
4500 inlen = 0;
4501 else
4502 memset(retv, 0, inlen);
4503
4504 if (c->init_groups.size == 0)
4505 return 0;
4506
4507 for (int i = 0; i < c->init_groups.size; i++)
4508 strprint(retv, inlen, "%s%d", (i > 0) ? "," : "",
4509 c->init_groups.list[i]);
4510
4511 return fulllen;
4512 }
4513
4514 static int get_config_ephemeral(const char *key, char *retv, int inlen,
4515 struct lxc_conf *c, void *data)
4516 {
4517 return lxc_get_conf_int(c, retv, inlen, c->ephemeral);
4518 }
4519
4520 static int get_config_no_new_privs(const char *key, char *retv, int inlen,
4521 struct lxc_conf *c, void *data)
4522 {
4523 return lxc_get_conf_int(c, retv, inlen, c->no_new_privs);
4524 }
4525
4526 /* If you ask for a specific value, i.e. lxc.prlimit.nofile, then just the value
4527 * will be printed. If you ask for 'lxc.prlimit', then all limit entries will be
4528 * printed, in 'lxc.prlimit.resource = value' format.
4529 */
4530 static int get_config_prlimit(const char *key, char *retv, int inlen,
4531 struct lxc_conf *c, void *data)
4532 {
4533 int fulllen = 0, len;
4534 bool get_all = false;
4535 struct lxc_limit *lim;
4536
4537 if (!retv)
4538 inlen = 0;
4539 else
4540 memset(retv, 0, inlen);
4541
4542 if (strequal(key, "lxc.prlimit"))
4543 get_all = true;
4544 else if (strnequal(key, "lxc.prlimit.", 12))
4545 key += 12;
4546 else
4547 return ret_errno(EINVAL);
4548
4549 list_for_each_entry(lim, &c->limits, head) {
4550 /* 2 colon separated 64 bit integers or the word 'unlimited' */
4551 char buf[INTTYPE_TO_STRLEN(uint64_t) * 2 + 2];
4552 int partlen;
4553
4554 if (lim->limit.rlim_cur == RLIM_INFINITY) {
4555 memcpy(buf, "unlimited", STRLITERALLEN("unlimited") + 1);
4556 partlen = STRLITERALLEN("unlimited");
4557 } else {
4558 partlen = sprintf(buf, "%" PRIu64,
4559 (uint64_t)lim->limit.rlim_cur);
4560 }
4561
4562 if (lim->limit.rlim_cur != lim->limit.rlim_max) {
4563 if (lim->limit.rlim_max == RLIM_INFINITY)
4564 memcpy(buf + partlen, ":unlimited",
4565 STRLITERALLEN(":unlimited") + 1);
4566 else
4567 sprintf(buf + partlen, ":%" PRIu64,
4568 (uint64_t)lim->limit.rlim_max);
4569 }
4570
4571 if (get_all) {
4572 strprint(retv, inlen, "lxc.prlimit.%s = %s\n",
4573 lim->resource, buf);
4574 } else if (strequal(lim->resource, key)) {
4575 strprint(retv, inlen, "%s", buf);
4576 }
4577 }
4578
4579 return fulllen;
4580 }
4581
4582 /* If you ask for a specific value, i.e. lxc.sysctl.net.ipv4.ip_forward, then
4583 * just the value will be printed. If you ask for 'lxc.sysctl', then all sysctl
4584 * entries will be printed, in 'lxc.sysctl.key = value' format.
4585 */
4586 static int get_config_sysctl(const char *key, char *retv, int inlen,
4587 struct lxc_conf *c, void *data)
4588 {
4589 int fulllen = 0;
4590 bool get_all = false;
4591 int len;
4592 struct lxc_sysctl *sysctl;
4593
4594 if (!retv)
4595 inlen = 0;
4596 else
4597 memset(retv, 0, inlen);
4598
4599 if (strequal(key, "lxc.sysctl"))
4600 get_all = true;
4601 else if (strnequal(key, "lxc.sysctl.", STRLITERALLEN("lxc.sysctl.")))
4602 key += STRLITERALLEN("lxc.sysctl.");
4603 else
4604 return ret_errno(EINVAL);
4605
4606 list_for_each_entry(sysctl, &c->sysctls, head) {
4607 if (get_all) {
4608 strprint(retv, inlen, "lxc.sysctl.%s = %s\n", sysctl->key,
4609 sysctl->value);
4610 } else if (strequal(sysctl->key, key)) {
4611 strprint(retv, inlen, "%s", sysctl->value);
4612 }
4613 }
4614
4615 return fulllen;
4616 }
4617
4618 static int get_config_proc(const char *key, char *retv, int inlen,
4619 struct lxc_conf *c, void *data)
4620 {
4621 int fulllen = 0;
4622 bool get_all = false;
4623 int len;
4624 struct lxc_proc *proc;
4625
4626 if (!retv)
4627 inlen = 0;
4628 else
4629 memset(retv, 0, inlen);
4630
4631 if (strequal(key, "lxc.proc"))
4632 get_all = true;
4633 else if (strnequal(key, "lxc.proc.", STRLITERALLEN("lxc.proc.")))
4634 key += STRLITERALLEN("lxc.proc.");
4635 else
4636 return ret_errno(EINVAL);
4637
4638 list_for_each_entry(proc, &c->procs, head) {
4639 if (get_all) {
4640 strprint(retv, inlen, "lxc.proc.%s = %s\n",
4641 proc->filename, proc->value);
4642 } else if (strequal(proc->filename, key)) {
4643 strprint(retv, inlen, "%s", proc->value);
4644 }
4645 }
4646
4647 return fulllen;
4648 }
4649
4650 static int get_config_namespace_clone(const char *key, char *retv, int inlen,
4651 struct lxc_conf *c, void *data)
4652 {
4653 int i, len;
4654 int fulllen = 0;
4655
4656 if (!retv)
4657 inlen = 0;
4658 else
4659 memset(retv, 0, inlen);
4660
4661 for (i = 0; i < LXC_NS_MAX; i++) {
4662 if (c->ns_clone & ns_info[i].clone_flag)
4663 strprint(retv, inlen, "%s\n", ns_info[i].proc_name);
4664 }
4665
4666 return fulllen;
4667 }
4668
4669 static int get_config_namespace_keep(const char *key, char *retv, int inlen,
4670 struct lxc_conf *c, void *data)
4671 {
4672 int i, len;
4673 int fulllen = 0;
4674
4675 if (!retv)
4676 inlen = 0;
4677 else
4678 memset(retv, 0, inlen);
4679
4680 for (i = 0; i < LXC_NS_MAX; i++) {
4681 if (c->ns_keep & ns_info[i].clone_flag)
4682 strprint(retv, inlen, "%s\n", ns_info[i].proc_name);
4683 }
4684
4685 return fulllen;
4686 }
4687
4688 static int get_config_time_offset_boot(const char *key, char *retv, int inlen, struct lxc_conf *c,
4689 void *data)
4690 {
4691 int len;
4692 int fulllen = 0;
4693
4694 if (!retv)
4695 inlen = 0;
4696 else
4697 memset(retv, 0, inlen);
4698
4699 if (c->timens.s_boot) {
4700 strprint(retv, inlen, "%" PRId64 " s\n", c->timens.s_boot);
4701 } else {
4702 strprint(retv, inlen, "%" PRId64 " ns\n", c->timens.ns_boot);
4703 }
4704
4705 return fulllen;
4706 }
4707
4708 static int get_config_time_offset_monotonic(const char *key, char *retv, int inlen,
4709 struct lxc_conf *c, void *data)
4710 {
4711 int len;
4712 int fulllen = 0;
4713
4714 if (!retv)
4715 inlen = 0;
4716 else
4717 memset(retv, 0, inlen);
4718
4719 if (c->timens.s_monotonic) {
4720 strprint(retv, inlen, "%" PRId64 "s\n", c->timens.s_monotonic);
4721 } else {
4722 strprint(retv, inlen, "%" PRId64 "ns\n", c->timens.ns_monotonic);
4723 }
4724
4725 return fulllen;
4726 }
4727
4728 static int get_config_namespace_share(const char *key, char *retv, int inlen,
4729 struct lxc_conf *c, void *data)
4730 {
4731 int len, ns_idx;
4732 const char *namespace;
4733 int fulllen = 0;
4734
4735 if (!retv)
4736 inlen = 0;
4737 else
4738 memset(retv, 0, inlen);
4739
4740 namespace = key + STRLITERALLEN("lxc.namespace.share.");
4741 if (is_empty_string(namespace))
4742 return ret_errno(EINVAL);
4743
4744 ns_idx = lxc_namespace_2_ns_idx(namespace);
4745 if (ns_idx < 0)
4746 return ns_idx;
4747
4748 strprint(retv, inlen, "%s", c->ns_share[ns_idx]);
4749
4750 return fulllen;
4751 }
4752
4753 /* Callbacks to clear config items. */
4754 static inline int clr_config_personality(const char *key, struct lxc_conf *c,
4755 void *data)
4756 {
4757 c->personality = -1;
4758 return 0;
4759 }
4760
4761 static inline int clr_config_pty_max(const char *key, struct lxc_conf *c,
4762 void *data)
4763 {
4764 c->pty_max = 0;
4765 return 0;
4766 }
4767
4768 static inline int clr_config_tty_max(const char *key, struct lxc_conf *c,
4769 void *data)
4770 {
4771 c->ttys.tty = 0;
4772 return 0;
4773 }
4774
4775 static inline int clr_config_tty_dir(const char *key, struct lxc_conf *c,
4776 void *data)
4777 {
4778 free_disarm(c->ttys.dir);
4779 return 0;
4780 }
4781
4782 static inline int clr_config_apparmor_profile(const char *key,
4783 struct lxc_conf *c, void *data)
4784 {
4785 #if HAVE_APPARMOR
4786 free_disarm(c->lsm_aa_profile);
4787 return 0;
4788 #else
4789 return syserror_set(-EINVAL, "Built without AppArmor support");
4790 #endif
4791 }
4792
4793 static inline int clr_config_apparmor_allow_incomplete(const char *key,
4794 struct lxc_conf *c,
4795 void *data)
4796 {
4797 #if HAVE_APPARMOR
4798 c->lsm_aa_allow_incomplete = 0;
4799 return 0;
4800 #else
4801 return syserror_set(-EINVAL, "Built without AppArmor support");
4802 #endif
4803 }
4804
4805 static inline int clr_config_apparmor_allow_nesting(const char *key,
4806 struct lxc_conf *c,
4807 void *data)
4808 {
4809 #if HAVE_APPARMOR
4810 c->lsm_aa_allow_nesting = 0;
4811 return 0;
4812 #else
4813 return syserror_set(-EINVAL, "Built without AppArmor support");
4814 #endif
4815 }
4816
4817 static inline int clr_config_apparmor_raw(const char *key,
4818 struct lxc_conf *c,
4819 void *data)
4820 {
4821 #if HAVE_APPARMOR
4822 return lxc_clear_apparmor_raw(c);
4823 #else
4824 return syserror_set(-EINVAL, "Built without AppArmor support");
4825 #endif
4826 }
4827
4828 static inline int clr_config_selinux_context(const char *key,
4829 struct lxc_conf *c, void *data)
4830 {
4831 #if HAVE_SELINUX
4832 free_disarm(c->lsm_se_context);
4833 return 0;
4834 #else
4835 return syserror_set(-EINVAL, "Built without SELinux support");
4836 #endif
4837 }
4838
4839 static inline int clr_config_selinux_context_keyring(const char *key,
4840 struct lxc_conf *c, void *data)
4841 {
4842 #if HAVE_SELINUX
4843 free_disarm(c->lsm_se_keyring_context);
4844 return 0;
4845 #else
4846 return syserror_set(-EINVAL, "Built without SELinux support");
4847 #endif
4848 }
4849
4850 static inline int clr_config_keyring_session(const char *key,
4851 struct lxc_conf *c, void *data)
4852 {
4853 c->keyring_disable_session = false;
4854 return 0;
4855 }
4856
4857 static inline int clr_config_cgroup_controller(const char *key,
4858 struct lxc_conf *c, void *data)
4859 {
4860 return lxc_clear_cgroups(c, key, CGROUP_SUPER_MAGIC);
4861 }
4862
4863 static inline int clr_config_cgroup2_controller(const char *key,
4864 struct lxc_conf *c, void *data)
4865 {
4866 return lxc_clear_cgroups(c, key, CGROUP2_SUPER_MAGIC);
4867 }
4868
4869 static int clr_config_cgroup_dir(const char *key, struct lxc_conf *lxc_conf,
4870 void *data)
4871 {
4872 if (!strequal(key, "lxc.cgroup.dir"))
4873 return ret_errno(EINVAL);
4874
4875 if (lxc_conf->cgroup_meta.dir)
4876 free_disarm(lxc_conf->cgroup_meta.dir);
4877
4878 return 0;
4879 }
4880
4881 static int clr_config_cgroup_monitor_dir(const char *key,
4882 struct lxc_conf *lxc_conf,
4883 void *data)
4884 {
4885 free_disarm(lxc_conf->cgroup_meta.monitor_dir);
4886 return 0;
4887 }
4888
4889 static int clr_config_cgroup_monitor_pivot_dir(const char *key,
4890 struct lxc_conf *lxc_conf,
4891 void *data)
4892 {
4893 free_disarm(lxc_conf->cgroup_meta.monitor_pivot_dir);
4894 return 0;
4895 }
4896
4897 static int clr_config_cgroup_container_dir(const char *key,
4898 struct lxc_conf *lxc_conf,
4899 void *data)
4900 {
4901 free_disarm(lxc_conf->cgroup_meta.container_dir);
4902 return 0;
4903 }
4904
4905 static int clr_config_cgroup_container_inner_dir(const char *key,
4906 struct lxc_conf *lxc_conf,
4907 void *data)
4908 {
4909 free_disarm(lxc_conf->cgroup_meta.namespace_dir);
4910 return 0;
4911 }
4912
4913 static inline int clr_config_cgroup_relative(const char *key,
4914 struct lxc_conf *lxc_conf,
4915 void *data)
4916 {
4917 lxc_conf->cgroup_meta.relative = false;
4918 return 0;
4919 }
4920
4921 static inline int clr_config_idmaps(const char *key, struct lxc_conf *c,
4922 void *data)
4923 {
4924 return lxc_clear_idmaps(c);
4925 }
4926
4927 static inline int clr_config_log_level(const char *key, struct lxc_conf *c,
4928 void *data)
4929 {
4930 c->loglevel = LXC_LOG_LEVEL_NOTSET;
4931 return 0;
4932 }
4933
4934 static inline int clr_config_log_file(const char *key, struct lxc_conf *c,
4935 void *data)
4936 {
4937 free_disarm(c->logfile);
4938 return 0;
4939 }
4940
4941 static inline int clr_config_mount(const char *key, struct lxc_conf *c,
4942 void *data)
4943 {
4944 return lxc_clear_mount_entries(c);
4945 }
4946
4947 static inline int clr_config_mount_auto(const char *key, struct lxc_conf *c,
4948 void *data)
4949 {
4950 return lxc_clear_automounts(c);
4951 }
4952
4953 static inline int clr_config_mount_fstab(const char *key, struct lxc_conf *c,
4954 void *data)
4955 {
4956 free_disarm(c->fstab);
4957 return 0;
4958 }
4959
4960 static inline int clr_config_rootfs_path(const char *key, struct lxc_conf *c,
4961 void *data)
4962 {
4963 free_disarm(c->rootfs.path);
4964 return 0;
4965 }
4966
4967 static inline int clr_config_rootfs_managed(const char *key, struct lxc_conf *c,
4968 void *data)
4969 {
4970 c->rootfs.managed = true;
4971 return 0;
4972 }
4973
4974 static inline int clr_config_rootfs_mount(const char *key, struct lxc_conf *c,
4975 void *data)
4976 {
4977 free_disarm(c->rootfs.mount);
4978 return 0;
4979 }
4980
4981 static inline int clr_config_rootfs_options(const char *key, struct lxc_conf *c,
4982 void *data)
4983 {
4984 put_lxc_mount_options(&c->rootfs.mnt_opts);
4985
4986 return 0;
4987 }
4988
4989 static inline int clr_config_uts_name(const char *key, struct lxc_conf *c,
4990 void *data)
4991 {
4992 free_disarm(c->utsname);
4993 return 0;
4994 }
4995
4996 static inline int clr_config_hooks(const char *key, struct lxc_conf *c,
4997 void *data)
4998 {
4999 return lxc_clear_hooks(c, key);
5000 }
5001
5002 static inline int clr_config_hooks_version(const char *key, struct lxc_conf *c,
5003 void *data)
5004 {
5005 /* default to legacy hooks version */
5006 c->hooks_version = 0;
5007 return 0;
5008 }
5009
5010 static inline int clr_config_net(const char *key, struct lxc_conf *c,
5011 void *data)
5012 {
5013 lxc_free_networks(c);
5014
5015 return 0;
5016 }
5017
5018 static inline int clr_config_cap_drop(const char *key, struct lxc_conf *c,
5019 void *data)
5020 {
5021 return lxc_clear_config_caps(c);
5022 }
5023
5024 static inline int clr_config_cap_keep(const char *key, struct lxc_conf *c,
5025 void *data)
5026 {
5027 return lxc_clear_config_keepcaps(c);
5028 }
5029
5030 static inline int clr_config_console_path(const char *key, struct lxc_conf *c,
5031 void *data)
5032 {
5033 free_disarm(c->console.path);
5034 return 0;
5035 }
5036
5037 static inline int clr_config_console_logfile(const char *key,
5038 struct lxc_conf *c, void *data)
5039 {
5040 free_disarm(c->console.log_path);
5041 return 0;
5042 }
5043
5044 static inline int clr_config_console_rotate(const char *key, struct lxc_conf *c,
5045 void *data)
5046 {
5047 c->console.log_rotate = 0;
5048 return 0;
5049 }
5050
5051 static inline int clr_config_console_buffer_size(const char *key,
5052 struct lxc_conf *c, void *data)
5053 {
5054 c->console.buffer_size = 0;
5055 return 0;
5056 }
5057
5058 static inline int clr_config_console_size(const char *key, struct lxc_conf *c,
5059 void *data)
5060 {
5061 c->console.log_size = 0;
5062 return 0;
5063 }
5064
5065 static inline int clr_config_seccomp_allow_nesting(const char *key,
5066 struct lxc_conf *c, void *data)
5067 {
5068 #ifdef HAVE_SECCOMP
5069 c->seccomp.allow_nesting = 0;
5070 return 0;
5071 #else
5072 return ret_errno(ENOSYS);
5073 #endif
5074 }
5075
5076 static inline int clr_config_seccomp_notify_cookie(const char *key,
5077 struct lxc_conf *c, void *data)
5078 {
5079 #ifdef HAVE_SECCOMP_NOTIFY
5080 free_disarm(c->seccomp.notifier.cookie);
5081 return 0;
5082 #else
5083 return ret_errno(ENOSYS);
5084 #endif
5085 }
5086
5087 static inline int clr_config_seccomp_notify_proxy(const char *key,
5088 struct lxc_conf *c, void *data)
5089 {
5090 #ifdef HAVE_SECCOMP_NOTIFY
5091 memset(&c->seccomp.notifier.proxy_addr, 0,
5092 sizeof(c->seccomp.notifier.proxy_addr));
5093 return 0;
5094 #else
5095 return ret_errno(ENOSYS);
5096 #endif
5097 }
5098
5099 static inline int clr_config_seccomp_profile(const char *key,
5100 struct lxc_conf *c, void *data)
5101 {
5102 free_disarm(c->seccomp.seccomp);
5103 return 0;
5104 }
5105
5106 static inline int clr_config_autodev(const char *key, struct lxc_conf *c,
5107 void *data)
5108 {
5109 c->autodev = 1;
5110 return 0;
5111 }
5112
5113 static inline int clr_config_autodev_tmpfs_size(const char *key, struct lxc_conf *c,
5114 void *data)
5115 {
5116 c->autodevtmpfssize = 500000;
5117 return 0;
5118 }
5119
5120 static inline int clr_config_signal_halt(const char *key, struct lxc_conf *c,
5121 void *data)
5122 {
5123 c->haltsignal = 0;
5124 return 0;
5125 }
5126
5127 static inline int clr_config_signal_reboot(const char *key, struct lxc_conf *c,
5128 void *data)
5129 {
5130 c->rebootsignal = 0;
5131 return 0;
5132 }
5133
5134 static inline int clr_config_signal_stop(const char *key, struct lxc_conf *c,
5135 void *data)
5136 {
5137 c->stopsignal = 0;
5138 return 0;
5139 }
5140
5141 static inline int clr_config_start(const char *key, struct lxc_conf *c,
5142 void *data)
5143 {
5144 if (strequal(key + 10, "auto"))
5145 c->start_auto = 0;
5146 else if (strequal(key + 10, "delay"))
5147 c->start_delay = 0;
5148 else if (strequal(key + 10, "order"))
5149 c->start_order = 0;
5150
5151 return 0;
5152 }
5153
5154 static inline int clr_config_log_syslog(const char *key, struct lxc_conf *c,
5155 void *data)
5156 {
5157 free_disarm(c->syslog);
5158 return 0;
5159 }
5160
5161 static inline int clr_config_monitor(const char *key, struct lxc_conf *c,
5162 void *data)
5163 {
5164 c->monitor_unshare = 0;
5165 return 0;
5166 }
5167
5168 static inline int clr_config_monitor_signal_pdeath(const char *key,
5169 struct lxc_conf *c, void *data)
5170 {
5171 c->monitor_signal_pdeath = 0;
5172 return 0;
5173 }
5174
5175 static inline int clr_config_group(const char *key, struct lxc_conf *c,
5176 void *data)
5177 {
5178 return lxc_clear_groups(c);
5179 }
5180
5181 static inline int clr_config_environment(const char *key, struct lxc_conf *c,
5182 void *data)
5183 {
5184 return lxc_clear_environment(c);
5185 }
5186
5187 static inline int clr_config_execute_cmd(const char *key, struct lxc_conf *c,
5188 void *data)
5189 {
5190 free_disarm(c->execute_cmd);
5191 return 0;
5192 }
5193
5194 static inline int clr_config_init_cmd(const char *key, struct lxc_conf *c,
5195 void *data)
5196 {
5197 free_disarm(c->init_cmd);
5198 return 0;
5199 }
5200
5201 static inline int clr_config_init_cwd(const char *key, struct lxc_conf *c,
5202 void *data)
5203 {
5204 free_disarm(c->init_cwd);
5205 return 0;
5206 }
5207
5208 static inline int clr_config_init_uid(const char *key, struct lxc_conf *c,
5209 void *data)
5210 {
5211 c->init_uid = 0;
5212 return 0;
5213 }
5214
5215 static inline int clr_config_init_gid(const char *key, struct lxc_conf *c,
5216 void *data)
5217 {
5218 c->init_gid = 0;
5219 return 0;
5220 }
5221
5222 static inline int clr_config_init_groups(const char *key, struct lxc_conf *c,
5223 void *data)
5224 {
5225 c->init_groups.size = 0;
5226 free_disarm(c->init_groups.list);
5227 return 0;
5228 }
5229
5230 static inline int clr_config_ephemeral(const char *key, struct lxc_conf *c,
5231 void *data)
5232 {
5233 c->ephemeral = 0;
5234 return 0;
5235 }
5236
5237 static inline int clr_config_no_new_privs(const char *key, struct lxc_conf *c,
5238 void *data)
5239 {
5240 c->no_new_privs = false;
5241 return 0;
5242 }
5243
5244 static inline int clr_config_prlimit(const char *key, struct lxc_conf *c,
5245 void *data)
5246 {
5247 return lxc_clear_limits(c, key);
5248 }
5249
5250 static inline int clr_config_sysctl(const char *key, struct lxc_conf *c,
5251 void *data)
5252 {
5253 return lxc_clear_sysctls(c, key);
5254 }
5255
5256 static inline int clr_config_proc(const char *key, struct lxc_conf *c,
5257 void *data)
5258 {
5259 return lxc_clear_procs(c, key);
5260 }
5261
5262 static inline int clr_config_includefiles(const char *key, struct lxc_conf *c,
5263 void *data)
5264 {
5265 return 0;
5266 }
5267
5268 static int clr_config_namespace_clone(const char *key,
5269 struct lxc_conf *lxc_conf, void *data)
5270 {
5271 lxc_conf->ns_clone = 0;
5272 return 0;
5273 }
5274
5275 static int clr_config_namespace_keep(const char *key, struct lxc_conf *lxc_conf,
5276 void *data)
5277 {
5278 lxc_conf->ns_keep = 0;
5279 return 0;
5280 }
5281
5282 static int clr_config_time_offset_boot(const char *key, struct lxc_conf *lxc_conf, void *data)
5283 {
5284 lxc_conf->timens.s_boot = 0;
5285 lxc_conf->timens.ns_boot = 0;
5286 return 0;
5287 }
5288
5289 static int clr_config_time_offset_monotonic(const char *key, struct lxc_conf *lxc_conf, void *data)
5290 {
5291 lxc_conf->timens.s_monotonic = 0;
5292 lxc_conf->timens.ns_monotonic = 0;
5293 return 0;
5294 }
5295
5296 static int clr_config_namespace_share(const char *key,
5297 struct lxc_conf *lxc_conf, void *data)
5298 {
5299 int ns_idx;
5300 const char *namespace;
5301
5302 namespace = key + STRLITERALLEN("lxc.namespace.share.");
5303 if (is_empty_string(namespace))
5304 return ret_errno(EINVAL);
5305
5306 ns_idx = lxc_namespace_2_ns_idx(namespace);
5307 if (ns_idx < 0)
5308 return ns_idx;
5309
5310 free(lxc_conf->ns_share[ns_idx]);
5311 lxc_conf->ns_share[ns_idx] = NULL;
5312
5313 return 0;
5314 }
5315
5316 static int get_config_includefiles(const char *key, char *retv, int inlen,
5317 struct lxc_conf *c, void *data)
5318 {
5319 return ret_errno(ENOSYS);
5320 }
5321
5322 struct config_net_info {
5323 char buf[NETWORK_SUBKEY_SIZE_MAX];
5324 const char *subkey;
5325 const struct lxc_config_net_t *ops;
5326 struct lxc_netdev *netdev;
5327 };
5328
5329 static int get_network_config_ops(const char *key, struct lxc_conf *lxc_conf,
5330 struct config_net_info *info, bool allocate)
5331 {
5332 int ret;
5333 int64_t tmpidx;
5334 unsigned int idx;
5335 const char *idx_start;
5336
5337 if (is_empty_string(key))
5338 return ret_errno(EINVAL);
5339
5340 /* check that this is a sensible network key */
5341 if (!strnequal("lxc.net.", key, STRLITERALLEN("lxc.net.")))
5342 return syserror_set(-EINVAL, "Invalid network configuration key \"%s\"", key);
5343
5344 /* lxc.net.<n> */
5345 /* beginning of index string */
5346 idx_start = key + STRLITERALLEN("lxc.net.");
5347 if (!isdigit(*idx_start))
5348 return syserror_set(-EINVAL, "Failed to detect digit in string \"%s\"", key + 8);
5349
5350 ret = lxc_safe_int64_residual(idx_start, &tmpidx, 10, info->buf, sizeof(info->buf));
5351 if (ret)
5352 return syserror("Failed to parse network index");
5353
5354 if (tmpidx < 0 || tmpidx >= INT_MAX)
5355 return syserror_set(-ERANGE, "Number of configured networks would overflow the counter");
5356 idx = (unsigned int)tmpidx;
5357
5358 info->netdev = lxc_get_netdev_by_idx(lxc_conf, idx, allocate);
5359 if (!info->netdev)
5360 return ret_errno(EINVAL);
5361
5362 /* Make sure subkey points to the empty string. */
5363 info->subkey = info->buf;
5364 if (is_empty_string(info->subkey))
5365 return ret_errno(ENOENT);
5366
5367 if (info->subkey[0] != '.')
5368 return syserror_set(-EINVAL, "Invalid subkey");
5369 info->subkey++;
5370
5371 /* lxc.net.<idx>.<subkey> */
5372 info->ops = lxc_get_config_net(info->subkey);
5373 if (info->ops == &unsupported_config_net_key)
5374 return syserror_set(-ENOENT, "Unknown network configuration key \"%s\"", key);
5375
5376 return 0;
5377 }
5378
5379 /* Config entry is something like "lxc.net.0.ipv4" the key 'lxc.net.' was
5380 * found. So we make sure next comes an integer, find the right callback (by
5381 * rewriting the key), and call it.
5382 */
5383 static int set_config_jump_table_net(const char *key, const char *value,
5384 struct lxc_conf *lxc_conf, void *data)
5385 {
5386 struct config_net_info info = {};
5387 int ret;
5388 const char *idxstring;
5389
5390 idxstring = key + STRLITERALLEN("lxc.net.");
5391 if (!isdigit(*idxstring))
5392 return ret_errno(EINVAL);
5393
5394 if (lxc_config_value_empty(value))
5395 return clr_config_jump_table_net(key, lxc_conf, data);
5396
5397 ret = get_network_config_ops(key, lxc_conf, &info, true);
5398 if (ret)
5399 return ret;
5400
5401 return info.ops->set(info.subkey, value, lxc_conf, info.netdev);
5402 }
5403
5404 static int clr_config_jump_table_net(const char *key, struct lxc_conf *lxc_conf,
5405 void *data)
5406 {
5407 struct config_net_info info = {};
5408 int ret;
5409 const char *idxstring;
5410
5411 idxstring = key + 8;
5412 if (!isdigit(*idxstring))
5413 return ret_errno(EINVAL);
5414
5415 /* The left conjunct is pretty self-explanatory. The right conjunct
5416 * checks whether the two pointers are equal. If they are we know that
5417 * this is not a key that is namespaced any further and so we are
5418 * supposed to clear the whole network.
5419 */
5420 if (isdigit(*idxstring) && (strrchr(key, '.') == (idxstring - 1))) {
5421 unsigned int rmnetdevidx;
5422
5423 ret = lxc_safe_uint(idxstring, &rmnetdevidx);
5424 if (ret < 0)
5425 return ret;
5426
5427 /* Remove network from network list. */
5428 lxc_remove_nic_by_idx(lxc_conf, rmnetdevidx);
5429 return 0;
5430 }
5431
5432 ret = get_network_config_ops(key, lxc_conf, &info, false);
5433 if (ret)
5434 return ret;
5435
5436 return info.ops->clr(info.subkey, lxc_conf, info.netdev);
5437 }
5438
5439 static int clr_config_net_type(const char *key, struct lxc_conf *lxc_conf,
5440 void *data)
5441 {
5442 struct lxc_netdev *netdev = data;
5443
5444 if (!netdev)
5445 return ret_errno(EINVAL);
5446
5447 lxc_clear_netdev(netdev);
5448
5449 return 0;
5450 }
5451
5452 static int clr_config_net_name(const char *key, struct lxc_conf *lxc_conf,
5453 void *data)
5454 {
5455 struct lxc_netdev *netdev = data;
5456
5457 if (!netdev)
5458 return ret_errno(EINVAL);
5459
5460 netdev->name[0] = '\0';
5461
5462 return 0;
5463 }
5464
5465 static int clr_config_net_flags(const char *key, struct lxc_conf *lxc_conf,
5466 void *data)
5467 {
5468 struct lxc_netdev *netdev = data;
5469
5470 if (!netdev)
5471 return ret_errno(EINVAL);
5472
5473 netdev->flags = 0;
5474
5475 return 0;
5476 }
5477
5478 static int clr_config_net_link(const char *key, struct lxc_conf *lxc_conf,
5479 void *data)
5480 {
5481 struct lxc_netdev *netdev = data;
5482
5483 if (!netdev)
5484 return ret_errno(EINVAL);
5485
5486 netdev->link[0] = '\0';
5487
5488 return 0;
5489 }
5490
5491 static int clr_config_net_l2proxy(const char *key, struct lxc_conf *lxc_conf,
5492 void *data)
5493 {
5494 struct lxc_netdev *netdev = data;
5495
5496 if (!netdev)
5497 return ret_errno(EINVAL);
5498
5499 netdev->l2proxy = false;
5500
5501 return 0;
5502 }
5503
5504 static int clr_config_net_macvlan_mode(const char *key,
5505 struct lxc_conf *lxc_conf, void *data)
5506 {
5507 struct lxc_netdev *netdev = data;
5508
5509 if (!netdev)
5510 return ret_errno(EINVAL);
5511
5512 if (netdev->type != LXC_NET_MACVLAN)
5513 return 0;
5514
5515 netdev->priv.macvlan_attr.mode = -1;
5516
5517 return 0;
5518 }
5519
5520 static int clr_config_net_ipvlan_mode(const char *key,
5521 struct lxc_conf *lxc_conf, void *data)
5522 {
5523 struct lxc_netdev *netdev = data;
5524
5525 if (!netdev)
5526 return ret_errno(EINVAL);
5527
5528 if (netdev->type != LXC_NET_IPVLAN)
5529 return 0;
5530
5531 netdev->priv.ipvlan_attr.mode = -1;
5532
5533 return 0;
5534 }
5535
5536 static int clr_config_net_ipvlan_isolation(const char *key,
5537 struct lxc_conf *lxc_conf, void *data)
5538 {
5539 struct lxc_netdev *netdev = data;
5540
5541 if (!netdev)
5542 return ret_errno(EINVAL);
5543
5544 if (netdev->type != LXC_NET_IPVLAN)
5545 return 0;
5546
5547 netdev->priv.ipvlan_attr.isolation = -1;
5548
5549 return 0;
5550 }
5551
5552 static int clr_config_net_veth_mode(const char *key,
5553 struct lxc_conf *lxc_conf, void *data)
5554 {
5555 struct lxc_netdev *netdev = data;
5556
5557 if (!netdev)
5558 return ret_errno(EINVAL);
5559
5560 if (netdev->type != LXC_NET_VETH)
5561 return 0;
5562
5563 netdev->priv.veth_attr.mode = -1;
5564
5565 return 0;
5566 }
5567
5568 static int clr_config_net_veth_pair(const char *key, struct lxc_conf *lxc_conf,
5569 void *data)
5570 {
5571 struct lxc_netdev *netdev = data;
5572
5573 if (!netdev)
5574 return ret_errno(EINVAL);
5575
5576 if (netdev->type != LXC_NET_VETH)
5577 return 0;
5578
5579 netdev->priv.veth_attr.pair[0] = '\0';
5580
5581 return 0;
5582 }
5583
5584 static int clr_config_net_veth_vlan_id(const char *key, struct lxc_conf *lxc_conf,
5585 void *data)
5586 {
5587 struct lxc_netdev *netdev = data;
5588
5589 if (!netdev)
5590 return ret_errno(EINVAL);
5591
5592 if (netdev->type != LXC_NET_VETH)
5593 return 0;
5594
5595 netdev->priv.veth_attr.vlan_id = 0;
5596 netdev->priv.veth_attr.vlan_id_set = false;
5597
5598 return 0;
5599 }
5600
5601 static int clr_config_net_veth_vlan_tagged_id(const char *key,
5602 struct lxc_conf *lxc_conf, void *data)
5603 {
5604 struct lxc_netdev *netdev = data;
5605 struct lxc_list *cur, *next;
5606
5607 if (!netdev)
5608 return ret_errno(EINVAL);
5609
5610 if (netdev->type != LXC_NET_VETH)
5611 return 0;
5612
5613 lxc_list_for_each_safe(cur, &netdev->priv.veth_attr.vlan_tagged_ids, next) {
5614 lxc_list_del(cur);
5615 free(cur);
5616 }
5617
5618 return 0;
5619 }
5620
5621
5622 static int clr_config_net_script_up(const char *key, struct lxc_conf *lxc_conf,
5623 void *data)
5624 {
5625 struct lxc_netdev *netdev = data;
5626
5627 if (!netdev)
5628 return ret_errno(EINVAL);
5629
5630 free_disarm(netdev->upscript);
5631
5632 return 0;
5633 }
5634
5635 static int clr_config_net_script_down(const char *key,
5636 struct lxc_conf *lxc_conf, void *data)
5637 {
5638 struct lxc_netdev *netdev = data;
5639
5640 if (!netdev)
5641 return ret_errno(EINVAL);
5642
5643 free_disarm(netdev->downscript);
5644
5645 return 0;
5646 }
5647
5648 static int clr_config_net_hwaddr(const char *key, struct lxc_conf *lxc_conf,
5649 void *data)
5650 {
5651 struct lxc_netdev *netdev = data;
5652
5653 if (!netdev)
5654 return ret_errno(EINVAL);
5655
5656 free_disarm(netdev->hwaddr);
5657
5658 return 0;
5659 }
5660
5661 static int clr_config_net_mtu(const char *key, struct lxc_conf *lxc_conf,
5662 void *data)
5663 {
5664 struct lxc_netdev *netdev = data;
5665
5666 if (!netdev)
5667 return ret_errno(EINVAL);
5668
5669 free_disarm(netdev->mtu);
5670
5671 return 0;
5672 }
5673
5674 static int clr_config_net_vlan_id(const char *key, struct lxc_conf *lxc_conf,
5675 void *data)
5676 {
5677 struct lxc_netdev *netdev = data;
5678
5679 if (!netdev)
5680 return ret_errno(EINVAL);
5681
5682 if (netdev->type != LXC_NET_VLAN)
5683 return 0;
5684
5685 netdev->priv.vlan_attr.vid = 0;
5686
5687 return 0;
5688 }
5689
5690 static int clr_config_net_ipv4_gateway(const char *key,
5691 struct lxc_conf *lxc_conf, void *data)
5692 {
5693 struct lxc_netdev *netdev = data;
5694
5695 if (!netdev)
5696 return ret_errno(EINVAL);
5697
5698 free_disarm(netdev->ipv4_gateway);
5699
5700 return 0;
5701 }
5702
5703 static int clr_config_net_ipv4_address(const char *key,
5704 struct lxc_conf *lxc_conf, void *data)
5705 {
5706 struct lxc_netdev *netdev = data;
5707 struct lxc_list *cur, *next;
5708
5709 if (!netdev)
5710 return ret_errno(EINVAL);
5711
5712 lxc_list_for_each_safe(cur, &netdev->ipv4, next) {
5713 lxc_list_del(cur);
5714 free(cur->elem);
5715 free(cur);
5716 }
5717
5718 return 0;
5719 }
5720
5721 static int clr_config_net_veth_ipv4_route(const char *key,
5722 struct lxc_conf *lxc_conf, void *data)
5723 {
5724 struct lxc_netdev *netdev = data;
5725 struct lxc_list *cur, *next;
5726
5727 if (!netdev)
5728 return ret_errno(EINVAL);
5729
5730 if (netdev->type != LXC_NET_VETH)
5731 return 0;
5732
5733 lxc_list_for_each_safe(cur, &netdev->priv.veth_attr.ipv4_routes, next) {
5734 lxc_list_del(cur);
5735 free(cur->elem);
5736 free(cur);
5737 }
5738
5739 return 0;
5740 }
5741
5742 static int clr_config_net_ipv6_gateway(const char *key,
5743 struct lxc_conf *lxc_conf, void *data)
5744 {
5745 struct lxc_netdev *netdev = data;
5746
5747 if (!netdev)
5748 return ret_errno(EINVAL);
5749
5750 free_disarm(netdev->ipv6_gateway);
5751
5752 return 0;
5753 }
5754
5755 static int clr_config_net_ipv6_address(const char *key,
5756 struct lxc_conf *lxc_conf, void *data)
5757 {
5758 struct lxc_netdev *netdev = data;
5759 struct lxc_list *cur, *next;
5760
5761 if (!netdev)
5762 return ret_errno(EINVAL);
5763
5764 lxc_list_for_each_safe(cur, &netdev->ipv6, next) {
5765 lxc_list_del(cur);
5766 free(cur->elem);
5767 free(cur);
5768 }
5769
5770 return 0;
5771 }
5772
5773 static int clr_config_net_veth_ipv6_route(const char *key,
5774 struct lxc_conf *lxc_conf, void *data)
5775 {
5776 struct lxc_netdev *netdev = data;
5777 struct lxc_list *cur, *next;
5778
5779 if (!netdev)
5780 return ret_errno(EINVAL);
5781
5782 if (netdev->type != LXC_NET_VETH)
5783 return 0;
5784
5785 lxc_list_for_each_safe(cur, &netdev->priv.veth_attr.ipv6_routes, next) {
5786 lxc_list_del(cur);
5787 free(cur->elem);
5788 free(cur);
5789 }
5790
5791 return 0;
5792 }
5793
5794 static int get_config_jump_table_net(const char *key, char *retv, int inlen,
5795 struct lxc_conf *c, void *data)
5796 {
5797 struct config_net_info info = {};
5798 int ret;
5799 const char *idxstring;
5800
5801 idxstring = key + STRLITERALLEN("lxc.net.");
5802 if (!isdigit(*idxstring))
5803 return ret_errno(EINVAL);
5804
5805 ret = get_network_config_ops(key, c, &info, false);
5806 if (ret)
5807 return ret;
5808
5809 return info.ops->get(info.subkey, retv, inlen, c, info.netdev);
5810 }
5811
5812 static int get_config_net_type(const char *key, char *retv, int inlen,
5813 struct lxc_conf *c, void *data)
5814 {
5815 int len;
5816 int fulllen = 0;
5817 struct lxc_netdev *netdev = data;
5818
5819 if (!netdev)
5820 return ret_errno(EINVAL);
5821
5822 if (!retv)
5823 inlen = 0;
5824 else
5825 memset(retv, 0, inlen);
5826
5827 strprint(retv, inlen, "%s", lxc_net_type_to_str(netdev->type));
5828
5829 return fulllen;
5830 }
5831
5832 static int get_config_net_flags(const char *key, char *retv, int inlen,
5833 struct lxc_conf *c, void *data)
5834 {
5835 int len;
5836 int fulllen = 0;
5837 struct lxc_netdev *netdev = data;
5838
5839 if (!netdev)
5840 return ret_errno(EINVAL);
5841
5842 if (!retv)
5843 inlen = 0;
5844 else
5845 memset(retv, 0, inlen);
5846
5847 if (netdev->flags & IFF_UP)
5848 strprint(retv, inlen, "up");
5849
5850 return fulllen;
5851 }
5852
5853 static int get_config_net_link(const char *key, char *retv, int inlen,
5854 struct lxc_conf *c, void *data)
5855 {
5856 int len;
5857 int fulllen = 0;
5858 struct lxc_netdev *netdev = data;
5859
5860 if (!netdev)
5861 return ret_errno(EINVAL);
5862
5863 if (!retv)
5864 inlen = 0;
5865 else
5866 memset(retv, 0, inlen);
5867
5868 if (netdev->link[0] != '\0')
5869 strprint(retv, inlen, "%s", netdev->link);
5870
5871 return fulllen;
5872 }
5873
5874 static int get_config_net_l2proxy(const char *key, char *retv, int inlen,
5875 struct lxc_conf *c, void *data)
5876 {
5877 struct lxc_netdev *netdev = data;
5878
5879 if (!netdev)
5880 return ret_errno(EINVAL);
5881
5882 return lxc_get_conf_bool(c, retv, inlen, netdev->l2proxy);
5883 }
5884
5885 static int get_config_net_name(const char *key, char *retv, int inlen,
5886 struct lxc_conf *c, void *data)
5887 {
5888 int len;
5889 int fulllen = 0;
5890 struct lxc_netdev *netdev = data;
5891
5892 if (!netdev)
5893 return ret_errno(EINVAL);
5894
5895 if (!retv)
5896 inlen = 0;
5897 else
5898 memset(retv, 0, inlen);
5899
5900 if (netdev->name[0] != '\0')
5901 strprint(retv, inlen, "%s", netdev->name);
5902
5903 return fulllen;
5904 }
5905
5906 static int get_config_net_macvlan_mode(const char *key, char *retv, int inlen,
5907 struct lxc_conf *c, void *data)
5908 {
5909 int len;
5910 int fulllen = 0;
5911 const char *mode;
5912 struct lxc_netdev *netdev = data;
5913
5914 if (!netdev)
5915 return ret_errno(EINVAL);
5916
5917 if (netdev->type != LXC_NET_MACVLAN)
5918 return ret_errno(EINVAL);
5919
5920 if (!retv)
5921 inlen = 0;
5922 else
5923 memset(retv, 0, inlen);
5924
5925 switch (netdev->priv.macvlan_attr.mode) {
5926 case MACVLAN_MODE_PRIVATE:
5927 mode = "private";
5928 break;
5929 case MACVLAN_MODE_VEPA:
5930 mode = "vepa";
5931 break;
5932 case MACVLAN_MODE_BRIDGE:
5933 mode = "bridge";
5934 break;
5935 case MACVLAN_MODE_PASSTHRU:
5936 mode = "passthru";
5937 break;
5938 default:
5939 mode = "(invalid)";
5940 break;
5941 }
5942
5943 strprint(retv, inlen, "%s", mode);
5944
5945 return fulllen;
5946 }
5947
5948 static int get_config_net_ipvlan_mode(const char *key, char *retv, int inlen,
5949 struct lxc_conf *c, void *data)
5950 {
5951 int fulllen = 0;
5952 struct lxc_netdev *netdev = data;
5953 int len;
5954 const char *mode;
5955
5956 if (!netdev)
5957 return ret_errno(EINVAL);
5958
5959 if (netdev->type != LXC_NET_IPVLAN)
5960 return ret_errno(EINVAL);
5961
5962 if (!retv)
5963 inlen = 0;
5964 else
5965 memset(retv, 0, inlen);
5966
5967 switch (netdev->priv.ipvlan_attr.mode) {
5968 case IPVLAN_MODE_L3:
5969 mode = "l3";
5970 break;
5971 case IPVLAN_MODE_L3S:
5972 mode = "l3s";
5973 break;
5974 case IPVLAN_MODE_L2:
5975 mode = "l2";
5976 break;
5977 default:
5978 mode = "(invalid)";
5979 break;
5980 }
5981
5982 strprint(retv, inlen, "%s", mode);
5983
5984 return fulllen;
5985 }
5986
5987 static int get_config_net_ipvlan_isolation(const char *key, char *retv, int inlen,
5988 struct lxc_conf *c, void *data)
5989 {
5990 int fulllen = 0;
5991 struct lxc_netdev *netdev = data;
5992 int len;
5993 const char *mode;
5994
5995 if (!netdev)
5996 return ret_errno(EINVAL);
5997
5998 if (netdev->type != LXC_NET_IPVLAN)
5999 return ret_errno(EINVAL);
6000
6001 if (!retv)
6002 inlen = 0;
6003 else
6004 memset(retv, 0, inlen);
6005
6006 switch (netdev->priv.ipvlan_attr.isolation) {
6007 case IPVLAN_ISOLATION_BRIDGE:
6008 mode = "bridge";
6009 break;
6010 case IPVLAN_ISOLATION_PRIVATE:
6011 mode = "private";
6012 break;
6013 case IPVLAN_ISOLATION_VEPA:
6014 mode = "vepa";
6015 break;
6016 default:
6017 mode = "(invalid)";
6018 break;
6019 }
6020
6021 strprint(retv, inlen, "%s", mode);
6022
6023 return fulllen;
6024 }
6025
6026 static int get_config_net_veth_mode(const char *key, char *retv, int inlen,
6027 struct lxc_conf *c, void *data)
6028 {
6029 int fulllen = 0;
6030 struct lxc_netdev *netdev = data;
6031 int len;
6032 const char *mode;
6033
6034 if (!netdev)
6035 return ret_errno(EINVAL);
6036
6037 if (netdev->type != LXC_NET_VETH)
6038 return ret_errno(EINVAL);
6039
6040 if (!retv)
6041 inlen = 0;
6042 else
6043 memset(retv, 0, inlen);
6044
6045 switch (netdev->priv.veth_attr.mode) {
6046 case VETH_MODE_BRIDGE:
6047 mode = "bridge";
6048 break;
6049 case VETH_MODE_ROUTER:
6050 mode = "router";
6051 break;
6052 default:
6053 mode = "(invalid)";
6054 break;
6055 }
6056
6057 strprint(retv, inlen, "%s", mode);
6058
6059 return fulllen;
6060 }
6061
6062 static int get_config_net_veth_pair(const char *key, char *retv, int inlen,
6063 struct lxc_conf *c, void *data)
6064 {
6065 int len;
6066 int fulllen = 0;
6067 struct lxc_netdev *netdev = data;
6068
6069 if (!netdev)
6070 return ret_errno(EINVAL);
6071
6072 if (netdev->type != LXC_NET_VETH)
6073 return ret_errno(EINVAL);
6074
6075 if (!retv)
6076 inlen = 0;
6077 else
6078 memset(retv, 0, inlen);
6079
6080 strprint(retv, inlen, "%s",
6081 netdev->priv.veth_attr.pair[0] != '\0'
6082 ? netdev->priv.veth_attr.pair
6083 : netdev->priv.veth_attr.veth1);
6084
6085 return fulllen;
6086 }
6087
6088 static int get_config_net_veth_vlan_id(const char *key, char *retv, int inlen,
6089 struct lxc_conf *c, void *data)
6090 {
6091 int len;
6092 int fulllen = 0;
6093 struct lxc_netdev *netdev = data;
6094
6095 if (!netdev)
6096 return ret_errno(EINVAL);
6097
6098 if (netdev->type != LXC_NET_VETH)
6099 return ret_errno(EINVAL);
6100
6101 if (!retv)
6102 inlen = 0;
6103 else
6104 memset(retv, 0, inlen);
6105
6106 strprint(retv, inlen, "%d", netdev->priv.veth_attr.vlan_id);
6107
6108 return fulllen;
6109 }
6110
6111 static int get_config_net_veth_vlan_tagged_id(const char *key, char *retv,
6112 int inlen, struct lxc_conf *c,
6113 void *data)
6114 {
6115 int len;
6116 size_t listlen;
6117 struct lxc_list *it;
6118 int fulllen = 0;
6119 struct lxc_netdev *netdev = data;
6120
6121 if (!netdev)
6122 return ret_errno(EINVAL);
6123
6124 if (netdev->type != LXC_NET_VETH)
6125 return ret_errno(EINVAL);
6126
6127 if (!retv)
6128 inlen = 0;
6129 else
6130 memset(retv, 0, inlen);
6131
6132 listlen = lxc_list_len(&netdev->priv.veth_attr.vlan_tagged_ids);
6133
6134 lxc_list_for_each(it, &netdev->priv.veth_attr.vlan_tagged_ids) {
6135 unsigned short i = PTR_TO_USHORT(it->elem);
6136 strprint(retv, inlen, "%u%s", i, (listlen-- > 1) ? "\n" : "");
6137 }
6138
6139 return fulllen;
6140 }
6141
6142 static int get_config_net_script_up(const char *key, char *retv, int inlen,
6143 struct lxc_conf *c, void *data)
6144 {
6145 int len;
6146 int fulllen = 0;
6147 struct lxc_netdev *netdev = data;
6148
6149 if (!netdev)
6150 return ret_errno(EINVAL);
6151
6152 if (!retv)
6153 inlen = 0;
6154 else
6155 memset(retv, 0, inlen);
6156
6157 if (netdev->upscript)
6158 strprint(retv, inlen, "%s", netdev->upscript);
6159
6160 return fulllen;
6161 }
6162
6163 static int get_config_net_script_down(const char *key, char *retv, int inlen,
6164 struct lxc_conf *c, void *data)
6165 {
6166 int len;
6167 int fulllen = 0;
6168 struct lxc_netdev *netdev = data;
6169
6170 if (!netdev)
6171 return ret_errno(EINVAL);
6172
6173 if (!retv)
6174 inlen = 0;
6175 else
6176 memset(retv, 0, inlen);
6177
6178 if (netdev->downscript)
6179 strprint(retv, inlen, "%s", netdev->downscript);
6180
6181 return fulllen;
6182 }
6183
6184 static int get_config_net_hwaddr(const char *key, char *retv, int inlen,
6185 struct lxc_conf *c, void *data)
6186 {
6187 int len;
6188 int fulllen = 0;
6189 struct lxc_netdev *netdev = data;
6190
6191 if (!netdev)
6192 return ret_errno(EINVAL);
6193
6194 if (!retv)
6195 inlen = 0;
6196 else
6197 memset(retv, 0, inlen);
6198
6199 if (netdev->hwaddr)
6200 strprint(retv, inlen, "%s", netdev->hwaddr);
6201
6202 return fulllen;
6203 }
6204
6205 static int get_config_net_mtu(const char *key, char *retv, int inlen,
6206 struct lxc_conf *c, void *data)
6207 {
6208 int len;
6209 int fulllen = 0;
6210 struct lxc_netdev *netdev = data;
6211
6212 if (!netdev)
6213 return ret_errno(EINVAL);
6214
6215 if (!retv)
6216 inlen = 0;
6217 else
6218 memset(retv, 0, inlen);
6219
6220 if (netdev->mtu)
6221 strprint(retv, inlen, "%s", netdev->mtu);
6222
6223 return fulllen;
6224 }
6225
6226 static int get_config_net_vlan_id(const char *key, char *retv, int inlen,
6227 struct lxc_conf *c, void *data)
6228 {
6229 int len;
6230 int fulllen = 0;
6231 struct lxc_netdev *netdev = data;
6232
6233 if (!netdev)
6234 return ret_errno(EINVAL);
6235
6236 if (netdev->type != LXC_NET_VLAN)
6237 return ret_errno(EINVAL);
6238
6239 if (!retv)
6240 inlen = 0;
6241 else
6242 memset(retv, 0, inlen);
6243
6244 strprint(retv, inlen, "%d", netdev->priv.vlan_attr.vid);
6245
6246 return fulllen;
6247 }
6248
6249 static int get_config_net_ipv4_gateway(const char *key, char *retv, int inlen,
6250 struct lxc_conf *c, void *data)
6251 {
6252 int len;
6253 char buf[INET_ADDRSTRLEN];
6254 int fulllen = 0;
6255 struct lxc_netdev *netdev = data;
6256
6257 if (!netdev)
6258 return ret_errno(EINVAL);
6259
6260 if (!retv)
6261 inlen = 0;
6262 else
6263 memset(retv, 0, inlen);
6264
6265 if (netdev->ipv4_gateway_auto) {
6266 strprint(retv, inlen, "auto");
6267 } else if (netdev->ipv4_gateway_dev) {
6268 strprint(retv, inlen, "dev");
6269 } else if (netdev->ipv4_gateway) {
6270 if (!inet_ntop(AF_INET, netdev->ipv4_gateway, buf, sizeof(buf)))
6271 return -errno;
6272 strprint(retv, inlen, "%s", buf);
6273 }
6274
6275 return fulllen;
6276 }
6277
6278 static int get_config_net_ipv4_address(const char *key, char *retv, int inlen,
6279 struct lxc_conf *c, void *data)
6280 {
6281 int len;
6282 size_t listlen;
6283 char buf[INET_ADDRSTRLEN];
6284 struct lxc_list *it;
6285 int fulllen = 0;
6286 struct lxc_netdev *netdev = data;
6287
6288 if (!netdev)
6289 return ret_errno(EINVAL);
6290
6291 if (!retv)
6292 inlen = 0;
6293 else
6294 memset(retv, 0, inlen);
6295
6296 listlen = lxc_list_len(&netdev->ipv4);
6297
6298 lxc_list_for_each(it, &netdev->ipv4) {
6299 struct lxc_inetdev *i = it->elem;
6300 if (!inet_ntop(AF_INET, &i->addr, buf, sizeof(buf)))
6301 return -errno;
6302 strprint(retv, inlen, "%s/%u%s", buf, i->prefix,
6303 (listlen-- > 1) ? "\n" : "");
6304 }
6305
6306 return fulllen;
6307 }
6308
6309 static int get_config_net_veth_ipv4_route(const char *key, char *retv, int inlen,
6310 struct lxc_conf *c, void *data)
6311 {
6312 int len;
6313 size_t listlen;
6314 char buf[INET_ADDRSTRLEN];
6315 struct lxc_list *it;
6316 int fulllen = 0;
6317 struct lxc_netdev *netdev = data;
6318
6319 if (!netdev)
6320 return ret_errno(EINVAL);
6321
6322 if (netdev->type != LXC_NET_VETH)
6323 return ret_errno(EINVAL);
6324
6325 if (!retv)
6326 inlen = 0;
6327 else
6328 memset(retv, 0, inlen);
6329
6330 listlen = lxc_list_len(&netdev->priv.veth_attr.ipv4_routes);
6331
6332 lxc_list_for_each(it, &netdev->priv.veth_attr.ipv4_routes) {
6333 struct lxc_inetdev *i = it->elem;
6334 if (!inet_ntop(AF_INET, &i->addr, buf, sizeof(buf)))
6335 return -errno;
6336 strprint(retv, inlen, "%s/%u%s", buf, i->prefix,
6337 (listlen-- > 1) ? "\n" : "");
6338 }
6339
6340 return fulllen;
6341 }
6342
6343 static int get_config_net_ipv6_gateway(const char *key, char *retv, int inlen,
6344 struct lxc_conf *c, void *data)
6345 {
6346 int len;
6347 char buf[INET6_ADDRSTRLEN];
6348 int fulllen = 0;
6349 struct lxc_netdev *netdev = data;
6350
6351 if (!netdev)
6352 return ret_errno(EINVAL);
6353
6354 if (!retv)
6355 inlen = 0;
6356 else
6357 memset(retv, 0, inlen);
6358
6359 if (netdev->ipv6_gateway_auto) {
6360 strprint(retv, inlen, "auto");
6361 } else if (netdev->ipv6_gateway_dev) {
6362 strprint(retv, inlen, "dev");
6363 } else if (netdev->ipv6_gateway) {
6364 if (!inet_ntop(AF_INET6, netdev->ipv6_gateway, buf, sizeof(buf)))
6365 return -errno;
6366 strprint(retv, inlen, "%s", buf);
6367 }
6368
6369 return fulllen;
6370 }
6371
6372 static int get_config_net_ipv6_address(const char *key, char *retv, int inlen,
6373 struct lxc_conf *c, void *data)
6374 {
6375 int len;
6376 size_t listlen;
6377 char buf[INET6_ADDRSTRLEN];
6378 struct lxc_list *it;
6379 int fulllen = 0;
6380 struct lxc_netdev *netdev = data;
6381
6382 if (!netdev)
6383 return ret_errno(EINVAL);
6384
6385 if (!retv)
6386 inlen = 0;
6387 else
6388 memset(retv, 0, inlen);
6389
6390 listlen = lxc_list_len(&netdev->ipv6);
6391
6392 lxc_list_for_each(it, &netdev->ipv6) {
6393 struct lxc_inet6dev *i = it->elem;
6394 if (!inet_ntop(AF_INET6, &i->addr, buf, sizeof(buf)))
6395 return -errno;
6396 strprint(retv, inlen, "%s/%u%s", buf, i->prefix,
6397 (listlen-- > 1) ? "\n" : "");
6398 }
6399
6400 return fulllen;
6401 }
6402
6403 static int get_config_net_veth_ipv6_route(const char *key, char *retv, int inlen,
6404 struct lxc_conf *c, void *data)
6405 {
6406 int len;
6407 size_t listlen;
6408 char buf[INET6_ADDRSTRLEN];
6409 struct lxc_list *it;
6410 int fulllen = 0;
6411 struct lxc_netdev *netdev = data;
6412
6413 if (!netdev)
6414 return ret_errno(EINVAL);
6415
6416 if (netdev->type != LXC_NET_VETH)
6417 return ret_errno(EINVAL);
6418
6419 if (!retv)
6420 inlen = 0;
6421 else
6422 memset(retv, 0, inlen);
6423
6424 listlen = lxc_list_len(&netdev->priv.veth_attr.ipv6_routes);
6425
6426 lxc_list_for_each(it, &netdev->priv.veth_attr.ipv6_routes) {
6427 struct lxc_inet6dev *i = it->elem;
6428 if (!inet_ntop(AF_INET6, &i->addr, buf, sizeof(buf)))
6429 return -errno;
6430 strprint(retv, inlen, "%s/%u%s", buf, i->prefix,
6431 (listlen-- > 1) ? "\n" : "");
6432 }
6433
6434 return fulllen;
6435 }
6436
6437 int lxc_list_config_items(char *retv, int inlen)
6438 {
6439 size_t i;
6440 int len;
6441 int fulllen = 0;
6442
6443 if (!retv)
6444 inlen = 0;
6445 else
6446 memset(retv, 0, inlen);
6447
6448 for (i = 0; i < ARRAY_SIZE(config_jump_table); i++) {
6449 char *s = config_jump_table[i].name;
6450
6451 if (s[strlen(s) - 1] == '.')
6452 continue;
6453
6454 strprint(retv, inlen, "%s\n", s);
6455 }
6456
6457 return fulllen;
6458 }
6459
6460 int lxc_list_subkeys(struct lxc_conf *conf, const char *key, char *retv,
6461 int inlen)
6462 {
6463 int len;
6464 int fulllen = 0;
6465
6466 if (!retv)
6467 inlen = 0;
6468 else
6469 memset(retv, 0, inlen);
6470
6471 if (strequal(key, "lxc.apparmor")) {
6472 strprint(retv, inlen, "allow_incomplete\n");
6473 strprint(retv, inlen, "allow_nesting\n");
6474 strprint(retv, inlen, "profile\n");
6475 strprint(retv, inlen, "raw\n");
6476 } else if (strequal(key, "lxc.cgroup")) {
6477 strprint(retv, inlen, "dir\n");
6478 } else if (strequal(key, "lxc.selinux")) {
6479 strprint(retv, inlen, "context\n");
6480 strprint(retv, inlen, "context.keyring\n");
6481 } else if (strequal(key, "lxc.mount")) {
6482 strprint(retv, inlen, "auto\n");
6483 strprint(retv, inlen, "entry\n");
6484 strprint(retv, inlen, "fstab\n");
6485 } else if (strequal(key, "lxc.rootfs")) {
6486 strprint(retv, inlen, "mount\n");
6487 strprint(retv, inlen, "options\n");
6488 strprint(retv, inlen, "path\n");
6489 } else if (strequal(key, "lxc.uts")) {
6490 strprint(retv, inlen, "name\n");
6491 } else if (strequal(key, "lxc.hook")) {
6492 strprint(retv, inlen, "autodev\n");
6493 strprint(retv, inlen, "autodevtmpfssize\n");
6494 strprint(retv, inlen, "clone\n");
6495 strprint(retv, inlen, "destroy\n");
6496 strprint(retv, inlen, "mount\n");
6497 strprint(retv, inlen, "post-stop\n");
6498 strprint(retv, inlen, "pre-mount\n");
6499 strprint(retv, inlen, "pre-start\n");
6500 strprint(retv, inlen, "start-host\n");
6501 strprint(retv, inlen, "start\n");
6502 strprint(retv, inlen, "stop\n");
6503 } else if (strequal(key, "lxc.cap")) {
6504 strprint(retv, inlen, "drop\n");
6505 strprint(retv, inlen, "keep\n");
6506 } else if (strequal(key, "lxc.console")) {
6507 strprint(retv, inlen, "logfile\n");
6508 strprint(retv, inlen, "path\n");
6509 } else if (strequal(key, "lxc.seccomp")) {
6510 strprint(retv, inlen, "profile\n");
6511 } else if (strequal(key, "lxc.signal")) {
6512 strprint(retv, inlen, "halt\n");
6513 strprint(retv, inlen, "reboot\n");
6514 strprint(retv, inlen, "stop\n");
6515 } else if (strequal(key, "lxc.start")) {
6516 strprint(retv, inlen, "auto\n");
6517 strprint(retv, inlen, "delay\n");
6518 strprint(retv, inlen, "order\n");
6519 } else if (strequal(key, "lxc.monitor")) {
6520 strprint(retv, inlen, "unshare\n");
6521 } else if (strequal(key, "lxc.keyring")) {
6522 strprint(retv, inlen, "session\n");
6523 } else {
6524 fulllen = ret_errno(EINVAL);
6525 }
6526
6527 return fulllen;
6528 }
6529
6530 int lxc_list_net(struct lxc_conf *c, const char *key, char *retv, int inlen)
6531 {
6532 struct config_net_info info = {};
6533 struct lxc_netdev *netdev;
6534 int len, ret;
6535 const char *idxstring;
6536 int fulllen = 0;
6537
6538 idxstring = key + STRLITERALLEN("lxc.net.");
6539 if (!isdigit(*idxstring))
6540 return ret_errno(EINVAL);
6541
6542 ret = get_network_config_ops(key, c, &info, false);
6543 if (ret) {
6544 if (ret != -ENOENT)
6545 return ret_errno(EINVAL);
6546 }
6547 netdev = info.netdev;
6548
6549 if (!retv)
6550 inlen = 0;
6551 else
6552 memset(retv, 0, inlen);
6553
6554 strprint(retv, inlen, "type\n");
6555 strprint(retv, inlen, "script.up\n");
6556 strprint(retv, inlen, "script.down\n");
6557
6558 if (netdev->type != LXC_NET_EMPTY) {
6559 strprint(retv, inlen, "flags\n");
6560 strprint(retv, inlen, "link\n");
6561 strprint(retv, inlen, "name\n");
6562 strprint(retv, inlen, "hwaddr\n");
6563 strprint(retv, inlen, "mtu\n");
6564 strprint(retv, inlen, "ipv6.address\n");
6565 strprint(retv, inlen, "ipv6.gateway\n");
6566 strprint(retv, inlen, "ipv4.address\n");
6567 strprint(retv, inlen, "ipv4.gateway\n");
6568 }
6569
6570 switch (netdev->type) {
6571 case LXC_NET_VETH:
6572 strprint(retv, inlen, "veth.pair\n");
6573 strprint(retv, inlen, "veth.ipv4.route\n");
6574 strprint(retv, inlen, "veth.ipv6.route\n");
6575 strprint(retv, inlen, "veth.vlan.id\n");
6576 break;
6577 case LXC_NET_MACVLAN:
6578 strprint(retv, inlen, "macvlan.mode\n");
6579 break;
6580 case LXC_NET_IPVLAN:
6581 strprint(retv, inlen, "ipvlan.mode\n");
6582 strprint(retv, inlen, "ipvlan.isolation\n");
6583 break;
6584 case LXC_NET_VLAN:
6585 strprint(retv, inlen, "vlan.id\n");
6586 break;
6587 case LXC_NET_PHYS:
6588 break;
6589 }
6590
6591 return fulllen;
6592 }