]> git.proxmox.com Git - mirror_lxc.git/blame - src/lxc/conf.h
github: Update for main branch
[mirror_lxc.git] / src / lxc / conf.h
CommitLineData
cc73685d
CB
1/* SPDX-License-Identifier: LGPL-2.1+ */
2
f1a4a029
ÇO
3#ifndef __LXC_CONF_H
4#define __LXC_CONF_H
0ad19a3f 5
481f03ef
CB
6#include "config.h"
7
9e99997b 8#include <linux/magic.h>
74a2b586 9#include <net/if.h>
1a0e70ac 10#include <netinet/in.h>
d38dd64a
CB
11#include <stdbool.h>
12#include <stdio.h>
b0a33c1e 13#include <sys/param.h>
8173e600 14#include <sys/types.h>
9e99997b
CB
15#include <sys/vfs.h>
16
4822319f 17#include "attach_options.h"
d84b26bc 18#include "caps.h"
d7f19646 19#include "compiler.h"
87d0990c 20#include "hlist.h"
f2363e38 21#include "list.h"
c3e3c21a 22#include "lxcseccomp.h"
ee91fa06 23#include "memory_utils.h"
74c2f58e 24#include "mount_utils.h"
734a677e 25#include "namespace.h"
732375f5 26#include "ringbuf.h"
d38dd64a 27#include "start.h"
734a677e 28#include "state.h"
4e86cad3 29#include "storage/storage.h"
02efd041 30#include "string_utils.h"
64a04c84 31#include "syscall_wrappers.h"
0ed9b1bc 32#include "terminal.h"
e3b4c4c4 33
d38dd64a
CB
34#if HAVE_SYS_RESOURCE_H
35#include <sys/resource.h>
36#endif
37
769872f9
SH
38#if HAVE_SCMP_FILTER_CTX
39typedef void * scmp_filter_ctx;
40#endif
41
64a04c84
CB
42typedef signed long personality_t;
43
97e9cfa0
SH
44/* worth moving to configure.ac? */
45#define subuidfile "/etc/subuid"
46#define subgidfile "/etc/subgid"
47
0ad19a3f 48/*
43654d34
CB
49 * Defines a generic struct to configure the control group. It is up to the
50 * programmer to specify the right subsystem.
ec64264d 51 * @subsystem : the targeted subsystem
576f946d 52 * @value : the value to set
54860ed0
CB
53 * @version : The version of the cgroup filesystem on which the controller
54 * resides.
43654d34
CB
55 *
56 * @controllers : The controllers to use for this container.
57 * @dir : The name of the directory containing the container's cgroup.
58 * Not that this is a per-container setting.
0ad19a3f 59 */
60struct lxc_cgroup {
43654d34
CB
61 union {
62 /* information about a specific controller */
63 struct /* controller */ {
54860ed0 64 int version;
43654d34
CB
65 char *subsystem;
66 char *value;
67 };
68
69 /* meta information about cgroup configuration */
70 struct /* meta */ {
71 char *controllers;
72 char *dir;
a900cbaf 73 char *monitor_dir;
7696c1f9 74 char *monitor_pivot_dir;
a900cbaf
WB
75 char *container_dir;
76 char *namespace_dir;
9caee129 77 bool relative;
c55353f8
SH
78 /* If an unpriv user in pure unified-only hierarchy
79 * starts a container, then we ask systemd to create
80 * a scope for us, and create the monitor and container
81 * cgroups under that.
82 * This will ignore the above things like monitor_dir
83 */
84 char *systemd_scope;
43654d34
CB
85 };
86 };
c9dbb8ed
CB
87
88 struct list_head head;
0ad19a3f 89};
90
ee91fa06
CB
91static void free_lxc_cgroup(struct lxc_cgroup *ptr)
92{
93 if (ptr) {
94 free(ptr->subsystem);
95 free(ptr->value);
96 free_disarm(ptr);
97 }
98}
99define_cleanup_function(struct lxc_cgroup *, free_lxc_cgroup);
100
c6d09e15 101#if !HAVE_SYS_RESOURCE_H
3a0e314d 102#define RLIM_INFINITY ((unsigned long)-1)
c6d09e15
WB
103struct rlimit {
104 unsigned long rlim_cur;
105 unsigned long rlim_max;
223797c3 106 struct list_head head;
c6d09e15
WB
107};
108#endif
3a0e314d 109
c6d09e15
WB
110/*
111 * Defines a structure to configure resource limits to set via setrlimit().
112 * @resource : the resource name in lowercase without the RLIMIT_ prefix
113 * @limit : the limit to set
114 */
115struct lxc_limit {
116 char *resource;
117 struct rlimit limit;
223797c3 118 struct list_head head;
c6d09e15
WB
119};
120
8fa831e0
CB
121static void free_lxc_limit(struct lxc_limit *ptr)
122{
123 if (ptr) {
631d2715 124 free_disarm(ptr->resource);
8fa831e0
CB
125 free_disarm(ptr);
126 }
127}
128define_cleanup_function(struct lxc_limit *, free_lxc_limit);
129
f6d3e3e4
SH
130enum idtype {
131 ID_TYPE_UID,
132 ID_TYPE_GID
133};
134
7edd0540
L
135/*
136 * Defines a structure to configure kernel parameters at runtime.
137 * @key : the kernel parameters will be configured without the "lxc.sysctl" prefix
138 * @value : the value to set
139 */
140struct lxc_sysctl {
141 char *key;
142 char *value;
ba9f9347 143 struct list_head head;
7edd0540
L
144};
145
f10c80d2
CB
146static void free_lxc_sysctl(struct lxc_sysctl *ptr)
147{
148 if (ptr) {
149 free(ptr->key);
150 free(ptr->value);
151 free_disarm(ptr);
152 }
153}
154define_cleanup_function(struct lxc_sysctl *, free_lxc_sysctl);
155
61d7a733
YT
156/*
157 * Defines a structure to configure proc filesystem at runtime.
158 * @filename : the proc filesystem will be configured without the "lxc.proc" prefix
159 * @value : the value to set
160 */
161struct lxc_proc {
162 char *filename;
163 char *value;
91d04bf9 164 struct list_head head;
61d7a733
YT
165};
166
83332c24
CB
167static void free_lxc_proc(struct lxc_proc *ptr)
168{
169 if (ptr) {
170 free(ptr->filename);
171 free(ptr->value);
172 free_disarm(ptr);
173 }
174}
175define_cleanup_function(struct lxc_proc *, free_lxc_proc);
176
f6d3e3e4
SH
177/*
178 * id_map is an id map entry. Form in confile is:
bdcbb6b3
CB
179 * lxc.idmap = u 0 9800 100
180 * lxc.idmap = u 1000 9900 100
181 * lxc.idmap = g 0 9800 100
182 * lxc.idmap = g 1000 9900 100
251d0d2a
DE
183 * meaning the container can use uids and gids 0-99 and 1000-1099,
184 * with [ug]id 0 mapping to [ug]id 9800 on the host, and [ug]id 1000 to
185 * [ug]id 9900 on the host.
f6d3e3e4
SH
186 */
187struct id_map {
188 enum idtype idtype;
251d0d2a 189 unsigned long hostid, nsid, range;
0589d744 190 struct list_head head;
f6d3e3e4
SH
191};
192
0e4be3cf 193/* Defines the number of tty configured and contains the
a589434e 194 * instantiated ptys
885766f5 195 * @max = number of configured ttys
b0a33c1e 196 */
197struct lxc_tty_info {
885766f5
CB
198 size_t max;
199 char *dir;
200 char *tty_names;
2520facd 201 struct lxc_terminal_info *tty;
b0a33c1e 202};
203
0b932f9d
CB
204typedef enum lxc_mount_options_t {
205 LXC_MOUNT_CREATE_DIR = 0,
206 LXC_MOUNT_CREATE_FILE = 1,
207 LXC_MOUNT_OPTIONAL = 2,
208 LXC_MOUNT_RELATIVE = 3,
f6815906
CB
209 LXC_MOUNT_IDMAP = 4,
210 LXC_MOUNT_MAX = 5,
0b932f9d
CB
211} lxc_mount_options_t;
212
213__hidden extern const char *lxc_mount_options_info[LXC_MOUNT_MAX];
214
215struct lxc_mount_options {
2df612d4
CB
216 unsigned int create_dir : 1;
217 unsigned int create_file : 1;
218 unsigned int optional : 1;
219 unsigned int relative : 1;
3eb23230
CB
220 unsigned int bind_recursively : 1;
221 unsigned int propagate_recursively : 1;
2df612d4 222 unsigned int bind : 1;
f6815906 223 char userns_path[PATH_MAX];
423374e9
CB
224 unsigned long mnt_flags;
225 unsigned long prop_flags;
226 char *data;
c1115e15 227 struct mount_attr attr;
e73af35b 228 char *raw_options;
0b932f9d
CB
229};
230
13bb312d 231/* Defines a structure to store the rootfs location, the
33fcb7a0 232 * optionals pivot_root, rootfs mount paths
953db219
CB
233 * @path : the rootfs source (directory or device)
234 * @mount : where it is mounted
952b5031 235 * @buf : static buffer to construct paths
588b53b1 236 * @bdev_type : optional backing store type
953db219 237 * @managed : whether it is managed by LXC
ea57e424 238 * @dfd_mnt : fd for @mount
a5a08920 239 * @dfd_dev : fd for /dev of the container
33fcb7a0
DL
240 */
241struct lxc_rootfs {
ea11a215 242 int dfd_host;
79ff643d 243
33fcb7a0 244 char *path;
79ff643d 245 int fd_path_pin;
4b875ef9 246 int dfd_idmapped;
79ff643d
CB
247
248 int dfd_mnt;
23b7ea69 249 char *mount;
79ff643d
CB
250
251 int dfd_dev;
252
952b5031 253 char buf[PATH_MAX];
b3b8c97f 254 char *bdev_type;
6e54330c 255 bool managed;
0b932f9d 256 struct lxc_mount_options mnt_opts;
4e86cad3 257 struct lxc_storage *storage;
33fcb7a0
DL
258};
259
368bbc02
CS
260/*
261 * Automatic mounts for LXC to perform inside the container
262 */
263enum {
62054cf3
CB
264 /* /proc read-write */
265 LXC_AUTO_PROC_RW = BIT(0),
266 /* /proc/sys and /proc/sysrq-trigger read-only */
267 LXC_AUTO_PROC_MIXED = BIT(1),
268 LXC_AUTO_PROC_MASK = LXC_AUTO_PROC_RW |
269 LXC_AUTO_PROC_MIXED,
270 /* /sys read-write */
271 LXC_AUTO_SYS_RW = BIT(2),
272 /* /sys read-only */
273 LXC_AUTO_SYS_RO = BIT(3),
274 /* /sys read-only and /sys/class/net read-write */
275 LXC_AUTO_SYS_MIXED = LXC_AUTO_SYS_RW |
276 LXC_AUTO_SYS_RO,
277 LXC_AUTO_SYS_MASK = LXC_AUTO_SYS_MIXED,
278
279 /* /sys/fs/cgroup (partial mount, read-only) */
280 LXC_AUTO_CGROUP_RO = BIT(4),
281 /* /sys/fs/cgroup (partial mount, read-write) */
282 LXC_AUTO_CGROUP_RW = BIT(5),
283 /* /sys/fs/cgroup (partial mount, paths r/o, cgroup r/w) */
284 LXC_AUTO_CGROUP_MIXED = LXC_AUTO_CGROUP_RO |
285 LXC_AUTO_CGROUP_RW,
286 /* /sys/fs/cgroup (full mount, read-only) */
287 LXC_AUTO_CGROUP_FULL_RO = BIT(6),
288 /* /sys/fs/cgroup (full mount, read-write) */
289 LXC_AUTO_CGROUP_FULL_RW = BIT(7),
290 /* /sys/fs/cgroup (full mount, parent r/o, own r/w) */
291 LXC_AUTO_CGROUP_FULL_MIXED = LXC_AUTO_CGROUP_FULL_RO |
292 LXC_AUTO_CGROUP_FULL_RW,
d90d3007
CB
293
294 /*
295 * Mount a pure read-write cgroup2 layout in the container independent
296 * of the cgroup layout used on the host.
297 */
298 LXC_AUTO_CGROUP2_RW = BIT(8),
299 /*
300 * Mount a pure read-only cgroup2 layout in the container independent
301 * of the cgroup layout used on the host.
302 */
303 LXC_AUTO_CGROUP2_RO = BIT(9),
304
3a0e314d
CB
305 /*
306 * These are defined in such a way as to retain binary compatibility
307 * with earlier versions of this code. If the previous mask is applied,
308 * both of these will default back to the _MIXED variants, which is
309 * safe.
310 */
62054cf3
CB
311 /* /sys/fs/cgroup (partial mount, r/w or mixed, depending on caps) */
312 LXC_AUTO_CGROUP_NOSPEC = 0x0B0,
313 /* /sys/fs/cgroup (full mount, r/w or mixed, depending on caps) */
314 LXC_AUTO_CGROUP_FULL_NOSPEC = 0x0E0,
315 /* mount cgroups even when cgroup namespaces are supported */
d90d3007 316 LXC_AUTO_CGROUP_FORCE = BIT(10),
62054cf3
CB
317 /* all known cgroup options */
318 LXC_AUTO_CGROUP_MASK = LXC_AUTO_CGROUP_MIXED |
319 LXC_AUTO_CGROUP_FULL_MIXED |
320 LXC_AUTO_CGROUP_NOSPEC |
321 LXC_AUTO_CGROUP_FULL_NOSPEC |
d90d3007
CB
322 LXC_AUTO_CGROUP_FORCE |
323 LXC_AUTO_CGROUP2_RW |
324 LXC_AUTO_CGROUP2_RO,
62054cf3
CB
325
326 /* shared mount point */
d90d3007 327 LXC_AUTO_SHMOUNTS = BIT(11),
62054cf3
CB
328 /* shared mount point mask */
329 LXC_AUTO_SHMOUNTS_MASK = LXC_AUTO_SHMOUNTS,
330
331 /* all known settings */
332 LXC_AUTO_ALL_MASK = LXC_AUTO_PROC_MASK |
333 LXC_AUTO_SYS_MASK |
334 LXC_AUTO_CGROUP_MASK,
368bbc02
CS
335};
336
26ddeedd 337enum lxchooks {
1a0e70ac
CB
338 LXCHOOK_PRESTART,
339 LXCHOOK_PREMOUNT,
340 LXCHOOK_MOUNT,
341 LXCHOOK_AUTODEV,
342 LXCHOOK_START,
343 LXCHOOK_STOP,
344 LXCHOOK_POSTSTOP,
345 LXCHOOK_CLONE,
346 LXCHOOK_DESTROY,
08dd2805 347 LXCHOOK_START_HOST,
1a0e70ac
CB
348 NUM_LXC_HOOKS
349};
72d0e1cb 350
59eac805 351__hidden extern char *lxchook_names[NUM_LXC_HOOKS];
7b35f3d6 352
d39b10eb
CB
353struct lxc_state_client {
354 int clientfd;
355 lxc_state_t states[MAX_STATE];
d2e75eba 356 struct list_head head;
d39b10eb
CB
357};
358
4b9dc703 359typedef enum lxc_bpf_devices_rule_t {
4b9dc703
CB
360 LXC_BPF_DEVICE_CGROUP_ALLOWLIST = 0,
361 LXC_BPF_DEVICE_CGROUP_DENYLIST = 1,
362} lxc_bpf_devices_rule_t;
fda39d45 363
4bfb655e
CB
364struct device_item {
365 char type;
366 int major;
367 int minor;
368 char access[4];
369 int allow;
93de768e 370 struct list_head head;
a134099d
CB
371};
372
373struct bpf_devices {
374 lxc_bpf_devices_rule_t list_type;
93de768e 375 struct list_head devices;
4bfb655e
CB
376};
377
70fd7fc9
CB
378struct timens_offsets {
379 /* Currently, either s_boot or ns_boot is set, but not both. */
380 int64_t s_boot;
381 int64_t ns_boot;
382
383 /* Currently, either s_monotonic or ns_monotonic is set, but not both. */
384 int64_t s_monotonic;
385 int64_t ns_monotonic;
386};
387
c294a68d
CB
388struct environment_entry {
389 char *key;
390 char *val;
391 struct list_head head;
392};
393
20ab7578
CB
394struct cap_entry {
395 char *cap_name;
7418b27f 396 __u32 cap;
20ab7578
CB
397 struct list_head head;
398};
399
400struct caps {
401 int keep;
402 struct list_head list;
403};
404
be0bc4d1
CB
405struct string_entry {
406 char *val;
407 struct list_head head;
408};
409
571e6ec8 410struct lxc_conf {
c7b17051
CB
411 /* Pointer to the name of the container. Do not free! */
412 const char *name;
07c4ea31 413 bool is_execute;
91480a0f 414 int reboot;
64a04c84 415 personality_t personality;
571e6ec8 416 struct utsname *utsname;
edd64e17 417
54860ed0 418 struct {
c9dbb8ed
CB
419 struct list_head cgroup;
420 struct list_head cgroup2;
a134099d 421 struct bpf_devices bpf_devices;
54860ed0 422 };
edd64e17 423
46ad64ab 424 struct {
0589d744 425 struct list_head id_map;
c7e345ae 426
edd64e17
CB
427 /*
428 * Pointer to the idmap entry for the container's root uid in
429 * the id_map list. Do not free!
430 */
5173b710 431 const struct id_map *root_nsuid_map;
c7e345ae 432
edd64e17
CB
433 /*
434 * Pointer to the idmap entry for the container's root gid in
435 * the id_map list. Do not free!
436 */
5173b710 437 const struct id_map *root_nsgid_map;
46ad64ab 438 };
edd64e17 439
87d0990c 440 struct list_head netdevs;
448d7b0c
CB
441
442 struct {
443 char *fstab;
444 int auto_mounts;
be0bc4d1 445 struct list_head mount_entries;
448d7b0c
CB
446 };
447
20ab7578 448 struct caps caps;
885766f5 449
a2db71c0 450 /* /dev/tty<idx> devices */
885766f5 451 struct lxc_tty_info ttys;
a2db71c0
CB
452 /* /dev/console device */
453 struct lxc_terminal console;
454 /* maximum pty devices allowed by devpts mount */
e528c735 455 size_t pty_max;
f797f05e
CB
456 /* file descriptor for the container's /dev/pts mount */
457 int devpts_fd;
885766f5 458
32fd6cf3
CB
459 /* set to true when rootfs has been setup */
460 bool rootfs_setup;
33fcb7a0 461 struct lxc_rootfs rootfs;
32fd6cf3 462
b3187a81 463 bool close_all_fds;
44ae0fb6
CB
464
465 struct {
466 unsigned int hooks_version;
5090de3e 467 struct list_head hooks[NUM_LXC_HOOKS];
44ae0fb6 468 };
4a85ce2a 469
fe4de9a6 470 char *lsm_aa_profile;
1800f924
WB
471 char *lsm_aa_profile_computed;
472 bool lsm_aa_profile_created;
473 unsigned int lsm_aa_allow_nesting;
a56e2df9 474 unsigned int lsm_aa_allow_incomplete;
1fb1e667 475 struct list_head lsm_aa_raw;
fe4de9a6 476 char *lsm_se_context;
4fef78bc 477 char *lsm_se_keyring_context;
8f818a84 478 bool keyring_disable_session;
952b5031 479 bool transient_procfs_mnt;
c3e3c21a 480 struct lxc_seccomp seccomp;
72d0e1cb 481 int maincmd_fd;
1a0e70ac 482 unsigned int autodev; /* if 1, mount and fill a /dev at start */
63012bdd 483 int autodevtmpfssize; /* size of the /dev tmpfs */
1a0e70ac
CB
484 int haltsignal; /* signal used to halt container */
485 int rebootsignal; /* signal used to reboot container */
486 int stopsignal; /* signal used to hard stop container */
487 char *rcfile; /* Copy of the top level rcfile we read */
488
b9949538 489 /* Logfile and loglevel can be set in a container config file. Those
7b660465 490 * function as defaults. The defaults can be overridden by command line.
1a0e70ac
CB
491 * However we don't want the command line specified values to be saved
492 * on c->save_config(). So we store the config file specified values
493 * here. */
98020c31
JS
494 char *logfile; /* the logfile as specified in config */
495 int loglevel; /* loglevel as specified in config (if any) */
858377e4 496 int logfd;
9f30a190 497
3590152f
CB
498 unsigned int start_auto;
499 unsigned int start_delay;
ee1e7aa0 500 int start_order;
ffb2a35f 501 struct list_head groups;
76a26f55 502 int nbd_idx;
35120d9c 503
a8dfe4e0 504 /* unshare the mount namespace in the monitor */
226dc30e 505 unsigned int monitor_unshare;
258f8051 506 unsigned int monitor_signal_pdeath;
a8dfe4e0 507
7c661726
MP
508 /* list of environment variables we'll add to the container when
509 * started */
c294a68d 510 struct list_head environment;
6b0d5538
SH
511
512 /* text representation of the config file */
513 char *unexpanded_config;
32fd6cf3
CB
514 size_t unexpanded_len;
515 size_t unexpanded_alloced;
67c660d0 516
5cda27c1
SH
517 /* default command for lxc-execute */
518 char *execute_cmd;
519
67c660d0
SG
520 /* init command */
521 char *init_cmd;
56f8ff00 522
4822319f 523 /* The uid to use for the container. */
c5cd20ce 524 uid_t init_uid;
4822319f 525 /* The gid to use for the container. */
c5cd20ce 526 gid_t init_gid;
4822319f
CB
527 /* The groups to use for the container. */
528 lxc_groups_t init_groups;
8796becf
CB
529
530 /* indicator if the container will be destroyed on shutdown */
66ffdb1a 531 unsigned int ephemeral;
76d0127f
CB
532
533 /* The facility to pass to syslog. Let's users establish as what type of
534 * program liblxc is supposed to write to the syslog. */
535 char *syslog;
5a46f283
CB
536
537 /* Whether PR_SET_NO_NEW_PRIVS will be set for the container. */
538 bool no_new_privs;
c6d09e15
WB
539
540 /* RLIMIT_* limits */
223797c3 541 struct list_head limits;
7ec2e32a 542
43654d34
CB
543 /* Contains generic info about the cgroup configuration for this
544 * container. Note that struct lxc_cgroup contains a union. It is only
545 * valid to access the members of the anonymous "meta" struct within
546 * that union.
547 */
548 struct lxc_cgroup cgroup_meta;
28d9e29e 549
b074bbf1 550 struct {
1d8d3676 551 int ns_clone;
abeb5bba 552 int ns_keep;
b074bbf1
CB
553 char *ns_share[LXC_NS_MAX];
554 };
3c491553
L
555
556 /* init working directory */
9e132956 557 char *init_cwd;
3c491553 558
d39b10eb 559 /* A list of clients registered to be informed about a container state. */
d2e75eba 560 struct list_head state_clients;
7edd0540
L
561
562 /* sysctls */
ba9f9347 563 struct list_head sysctls;
61d7a733
YT
564
565 /* procs */
91d04bf9 566 struct list_head procs;
adf0ba1f 567
7a41e857 568 struct shmount {
adf0ba1f
LT
569 /* Absolute path to the shared mount point on the host */
570 char *path_host;
571 /* Absolute path (in the container) to the shared mount point */
572 char *path_cont;
7a41e857 573 } shmount;
70fd7fc9
CB
574
575 struct timens_offsets timens;
09996a48
CB
576
577 bool sched_core;
578 __u64 sched_core_cookie;
571e6ec8
DL
579};
580
efb7e304
CB
581__hidden extern int write_id_mapping(enum idtype idtype, pid_t pid, const char *buf, size_t buf_size)
582 __access_r(3, 4);
344c9d81 583
d7f19646 584extern thread_local struct lxc_conf *current_config;
858377e4 585
efb7e304
CB
586__hidden extern int run_lxc_hooks(const char *name, char *hook, struct lxc_conf *conf, char *argv[]);
587__hidden extern struct lxc_conf *lxc_conf_init(void);
588__hidden extern void lxc_conf_free(struct lxc_conf *conf);
4e86cad3
CB
589__hidden extern int lxc_storage_prepare(struct lxc_conf *conf);
590__hidden extern int lxc_rootfs_prepare(struct lxc_conf *conf, bool userns);
591__hidden extern void lxc_storage_put(struct lxc_conf *conf);
239f29c9 592__hidden extern int lxc_rootfs_init(struct lxc_conf *conf, bool userns);
4b875ef9 593__hidden extern int lxc_rootfs_prepare_parent(struct lxc_handler *handler);
1b82d721 594__hidden extern int lxc_idmapped_mounts_parent(struct lxc_handler *handler);
0589d744 595__hidden extern int lxc_map_ids(struct list_head *idmap, pid_t pid);
efb7e304
CB
596__hidden extern int lxc_create_tty(const char *name, struct lxc_conf *conf);
597__hidden extern void lxc_delete_tty(struct lxc_tty_info *ttys);
598__hidden extern int lxc_clear_config_caps(struct lxc_conf *c);
efb7e304
CB
599__hidden extern int lxc_clear_cgroups(struct lxc_conf *c, const char *key, int version);
600__hidden extern int lxc_clear_mount_entries(struct lxc_conf *c);
601__hidden extern int lxc_clear_automounts(struct lxc_conf *c);
602__hidden extern int lxc_clear_hooks(struct lxc_conf *c, const char *key);
603__hidden extern int lxc_clear_idmaps(struct lxc_conf *c);
604__hidden extern int lxc_clear_groups(struct lxc_conf *c);
605__hidden extern int lxc_clear_environment(struct lxc_conf *c);
606__hidden extern int lxc_clear_limits(struct lxc_conf *c, const char *key);
607__hidden extern int lxc_delete_autodev(struct lxc_handler *handler);
608__hidden extern int lxc_clear_autodev_tmpfs_size(struct lxc_conf *c);
efb7e304
CB
609__hidden extern int lxc_setup_rootfs_prepare_root(struct lxc_conf *conf, const char *name,
610 const char *lxcpath);
611__hidden extern int lxc_setup(struct lxc_handler *handler);
612__hidden extern int lxc_setup_parent(struct lxc_handler *handler);
223797c3 613__hidden extern int setup_resource_limits(struct lxc_conf *conf, pid_t pid);
efb7e304
CB
614__hidden extern int find_unmapped_nsid(const struct lxc_conf *conf, enum idtype idtype);
615__hidden extern int mapped_hostid(unsigned id, const struct lxc_conf *conf, enum idtype idtype);
616__hidden extern int userns_exec_1(const struct lxc_conf *conf, int (*fn)(void *), void *data,
617 const char *fn_name);
618__hidden extern int userns_exec_full(struct lxc_conf *conf, int (*fn)(void *), void *data,
619 const char *fn_name);
d94eb390 620__hidden extern int parse_mntopts_legacy(const char *mntopts, unsigned long *mntflags, char **mntdata);
efb7e304 621__hidden extern int parse_propagationopts(const char *mntopts, unsigned long *pflags);
1b82d721 622__hidden extern int parse_lxc_mount_attrs(struct lxc_mount_options *opts, char *mnt_opts);
704cadd5 623__hidden extern int parse_mount_attrs(struct lxc_mount_options *opts, const char *mntopts);
efb7e304 624__hidden extern void tmp_proc_unmount(struct lxc_conf *lxc_conf);
efb7e304 625__hidden extern void suggest_default_idmap(void);
be0bc4d1
CB
626__hidden extern FILE *make_anonymous_mount_file(const struct list_head *mount,
627 bool include_nesting_helpers);
efb7e304
CB
628__hidden extern int run_script(const char *name, const char *section, const char *script, ...);
629__hidden extern int run_script_argv(const char *name, unsigned int hook_version, const char *section,
630 const char *script, const char *hookname, char **argsin);
309ae287 631
7418b27f
CB
632__hidden extern bool has_cap(__u32 cap, struct lxc_conf *conf);
633static inline bool lxc_wants_cap(__u32 cap, struct lxc_conf *conf)
309ae287 634{
7418b27f
CB
635 __u32 last_cap;
636 int ret;
637
638 ret = lxc_caps_last_cap(&last_cap);
639 if (ret)
640 return false;
641
642 if (last_cap < cap)
d84b26bc
CB
643 return false;
644
20ab7578 645 return has_cap(cap, conf);
309ae287
CB
646}
647
ba9f9347 648__hidden extern int setup_sysctl_parameters(struct lxc_conf *conf);
efb7e304 649__hidden extern int lxc_clear_sysctls(struct lxc_conf *c, const char *key);
91d04bf9 650__hidden extern int setup_proc_filesystem(struct lxc_conf *conf, pid_t pid);
efb7e304
CB
651__hidden extern int lxc_clear_procs(struct lxc_conf *c, const char *key);
652__hidden extern int lxc_clear_apparmor_raw(struct lxc_conf *c);
653__hidden extern int lxc_clear_namespace(struct lxc_conf *c);
654__hidden extern int userns_exec_minimal(const struct lxc_conf *conf, int (*fn_parent)(void *),
655 void *fn_parent_data, int (*fn_child)(void *),
656 void *fn_child_data);
657__hidden extern int userns_exec_mapped_root(const char *path, int path_fd,
658 const struct lxc_conf *conf);
6e1a327a
CB
659static inline int chown_mapped_root(const char *path, const struct lxc_conf *conf)
660{
661 return userns_exec_mapped_root(path, -EBADF, conf);
662}
5ae72b98 663
493ae3fe 664__hidden extern int lxc_sync_fds_parent(struct lxc_handler *handler);
111ed96e 665__hidden extern int lxc_sync_fds_child(struct lxc_handler *handler);
68f3899e 666
02efd041
CB
667static inline const char *get_rootfs_mnt(const struct lxc_rootfs *rootfs)
668{
669 static const char *s = "/";
670
671 return !is_empty_string(rootfs->path) ? rootfs->mount : s;
672}
673
423374e9
CB
674static inline void put_lxc_mount_options(struct lxc_mount_options *mnt_opts)
675{
676 mnt_opts->create_dir = 0;
677 mnt_opts->create_file = 0;
678 mnt_opts->optional = 0;
679 mnt_opts->relative = 0;
680 mnt_opts->userns_path[0] = '\0';
681 mnt_opts->mnt_flags = 0;
682 mnt_opts->prop_flags = 0;
683
423374e9 684 free_disarm(mnt_opts->data);
e73af35b 685 free_disarm(mnt_opts->raw_options);
423374e9
CB
686}
687
79ff643d
CB
688static inline void put_lxc_rootfs(struct lxc_rootfs *rootfs, bool unpin)
689{
690 if (rootfs) {
691 close_prot_errno_disarm(rootfs->dfd_host);
692 close_prot_errno_disarm(rootfs->dfd_mnt);
693 close_prot_errno_disarm(rootfs->dfd_dev);
694 if (unpin)
695 close_prot_errno_disarm(rootfs->fd_path_pin);
4b875ef9 696 close_prot_errno_disarm(rootfs->dfd_idmapped);
423374e9 697 put_lxc_mount_options(&rootfs->mnt_opts);
4e86cad3
CB
698 storage_put(rootfs->storage);
699 rootfs->storage = NULL;
79ff643d
CB
700 }
701}
702
a7744f12
CB
703static inline void lxc_clear_cgroup2_devices(struct bpf_devices *bpf_devices)
704{
93de768e 705 struct device_item *device, *n;
a7744f12 706
93de768e
CB
707 list_for_each_entry_safe(device, n, &bpf_devices->devices, head)
708 list_del(&device->head);
a7744f12 709
93de768e 710 INIT_LIST_HEAD(&bpf_devices->devices);
a7744f12
CB
711}
712
64a04c84
CB
713static inline int lxc_personality(personality_t persona)
714{
715 if (persona < 0)
716 return ret_errno(EINVAL);
717
718 return personality(persona);
719}
720
c294a68d 721__hidden extern int lxc_set_environment(const struct lxc_conf *conf);
7418b27f 722__hidden extern int parse_cap(const char *cap_name, __u32 *cap);
c294a68d 723
1a0e70ac 724#endif /* __LXC_CONF_H */