]> git.proxmox.com Git - mirror_lxc.git/blame - src/lxc/confile_utils.c
conf: use lxc_log_trace()
[mirror_lxc.git] / src / lxc / confile_utils.c
CommitLineData
cc73685d 1/* SPDX-License-Identifier: LGPL-2.1+ */
0b843d35 2
d38dd64a
CB
3#ifndef _GNU_SOURCE
4#define _GNU_SOURCE 1
5#endif
6#include <arpa/inet.h>
f9373e40 7#include <ctype.h>
0b843d35 8#include <stdio.h>
ce2f5ae8 9#include <stdlib.h>
0b843d35
CB
10#include <string.h>
11
663e9916 12#include "conf.h"
d38dd64a 13#include "config.h"
ce2f5ae8
CB
14#include "confile.h"
15#include "confile_utils.h"
16#include "error.h"
ce2f5ae8 17#include "list.h"
fd47e5f1 18#include "lxc.h"
28d9e29e
CB
19#include "log.h"
20#include "lxccontainer.h"
7b15813c 21#include "macro.h"
a4809e4e 22#include "memory_utils.h"
811ef482 23#include "network.h"
f9373e40 24#include "parse.h"
0b843d35
CB
25#include "utils.h"
26
18cd4b54
DJ
27#ifndef HAVE_STRLCPY
28#include "include/strlcpy.h"
29#endif
30
ac2cecc4 31lxc_log_define(confile_utils, lxc);
ce2f5ae8 32
0b843d35
CB
33int parse_idmaps(const char *idmap, char *type, unsigned long *nsid,
34 unsigned long *hostid, unsigned long *range)
35{
a4809e4e 36 __do_free char *dup = NULL;
0b843d35
CB
37 int ret = -1;
38 unsigned long tmp_hostid, tmp_nsid, tmp_range;
39 char tmp_type;
40 char *window, *slide;
0b843d35
CB
41
42 /* Duplicate string. */
43 dup = strdup(idmap);
44 if (!dup)
a4809e4e 45 return ret_errno(ENOMEM);
0b843d35
CB
46
47 /* A prototypical idmap entry would be: "u 1000 1000000 65536" */
48
49 /* align */
50 slide = window = dup;
51 /* skip whitespace */
52 slide += strspn(slide, " \t\r");
53 if (slide != window && *slide == '\0')
a4809e4e 54 return ret_errno(EINVAL);
0b843d35
CB
55
56 /* Validate type. */
a4809e4e
CB
57 if (*slide != 'u' && *slide != 'g')
58 return log_error_errno(-EINVAL, EINVAL, "Invalid id mapping type: %c", *slide);
a8b1ac78 59
0b843d35
CB
60 /* Assign type. */
61 tmp_type = *slide;
62
63 /* move beyond type */
64 slide++;
65 /* align */
66 window = slide;
67 /* Validate that only whitespace follows. */
68 slide += strspn(slide, " \t\r");
69 /* There must be whitespace. */
70 if (slide == window)
a4809e4e 71 return ret_errno(EINVAL);
0b843d35 72
f37d1c22 73 /* Mark beginning of nsid. */
0b843d35
CB
74 window = slide;
75 /* Validate that non-whitespace follows. */
76 slide += strcspn(slide, " \t\r");
77 /* There must be non-whitespace. */
78 if (slide == window || *slide == '\0')
a4809e4e 79 return ret_errno(EINVAL);
f37d1c22 80 /* Mark end of nsid. */
0b843d35
CB
81 *slide = '\0';
82
f37d1c22 83 /* Parse nsid. */
a4809e4e
CB
84 ret = lxc_safe_ulong(window, &tmp_nsid);
85 if (ret < 0)
86 return log_error_errno(ret, errno, "Failed to parse nsid: %s", window);
0b843d35
CB
87
88 /* Move beyond \0. */
89 slide++;
0b843d35
CB
90 /* Validate that only whitespace follows. */
91 slide += strspn(slide, " \t\r");
92 /* If there was only one whitespace then we whiped it with our \0 above.
93 * So only ensure that we're not at the end of the string.
94 */
95 if (*slide == '\0')
a4809e4e 96 return ret_errno(EINVAL);
0b843d35
CB
97
98 /* Mark beginning of hostid. */
99 window = slide;
100 /* Validate that non-whitespace follows. */
101 slide += strcspn(slide, " \t\r");
102 /* There must be non-whitespace. */
103 if (slide == window || *slide == '\0')
a4809e4e 104 return ret_errno(EINVAL);
f37d1c22 105 /* Mark end of nsid. */
0b843d35
CB
106 *slide = '\0';
107
108 /* Parse hostid. */
a4809e4e
CB
109 ret = lxc_safe_ulong(window, &tmp_hostid);
110 if (ret < 0)
111 return log_error_errno(ret, errno, "Failed to parse hostid: %s", window);
0b843d35
CB
112
113 /* Move beyond \0. */
114 slide++;
0b843d35
CB
115 /* Validate that only whitespace follows. */
116 slide += strspn(slide, " \t\r");
117 /* If there was only one whitespace then we whiped it with our \0 above.
118 * So only ensure that we're not at the end of the string.
119 */
120 if (*slide == '\0')
a4809e4e 121 return ret_errno(EINVAL);
0b843d35
CB
122
123 /* Mark beginning of range. */
124 window = slide;
125 /* Validate that non-whitespace follows. */
126 slide += strcspn(slide, " \t\r");
127 /* There must be non-whitespace. */
128 if (slide == window)
a4809e4e 129 return ret_errno(EINVAL);
0b843d35
CB
130
131 /* The range is the last valid entry we expect. So make sure that there
f37d1c22 132 * is no trailing garbage and if there is, error out.
0b843d35
CB
133 */
134 if (*(slide + strspn(slide, " \t\r\n")) != '\0')
a4809e4e 135 return ret_errno(EINVAL);
29c98ddd 136
0b843d35
CB
137 /* Mark end of range. */
138 *slide = '\0';
139
140 /* Parse range. */
a4809e4e
CB
141 ret = lxc_safe_ulong(window, &tmp_range);
142 if (ret < 0)
143 return log_error_errno(ret, errno, "Failed to parse id mapping range: %s", window);
0b843d35 144
a4809e4e
CB
145 *type = tmp_type;
146 *nsid = tmp_nsid;
0b843d35 147 *hostid = tmp_hostid;
a4809e4e 148 *range = tmp_range;
0b843d35
CB
149
150 /* Yay, we survived. */
a4809e4e 151 return 0;
0b843d35 152}
663e9916
CB
153
154bool lxc_config_value_empty(const char *value)
155{
156 if (value && strlen(value) > 0)
157 return false;
158
159 return true;
160}
ce2f5ae8 161
c302b476 162struct lxc_netdev *lxc_network_add(struct lxc_list *networks, int idx, bool tail)
ce2f5ae8 163{
1e323af6
CB
164 __do_free struct lxc_list *newlist = NULL;
165 __do_free struct lxc_netdev *netdev = NULL;
ce2f5ae8
CB
166
167 /* network does not exist */
168 netdev = malloc(sizeof(*netdev));
169 if (!netdev)
1e323af6 170 return ret_set_errno(NULL, ENOMEM);
ce2f5ae8
CB
171
172 memset(netdev, 0, sizeof(*netdev));
173 lxc_list_init(&netdev->ipv4);
174 lxc_list_init(&netdev->ipv6);
175
176 /* give network a unique index */
177 netdev->idx = idx;
178
179 /* prepare new list */
180 newlist = malloc(sizeof(*newlist));
1e323af6
CB
181 if (!newlist)
182 return ret_set_errno(NULL, ENOMEM);
ce2f5ae8
CB
183
184 lxc_list_init(newlist);
185 newlist->elem = netdev;
186
c302b476
CB
187 if (tail)
188 lxc_list_add_tail(networks, newlist);
189 else
190 lxc_list_add(networks, newlist);
1e323af6 191 move_ptr(newlist);
29c98ddd 192
1e323af6 193 return move_ptr(netdev);
ce2f5ae8 194}
1ed6ba91 195
c302b476
CB
196/* Takes care of finding the correct netdev struct in the networks list or
197 * allocates a new one if it couldn't be found.
198 */
199struct lxc_netdev *lxc_get_netdev_by_idx(struct lxc_conf *conf,
200 unsigned int idx, bool allocate)
201{
202 struct lxc_netdev *netdev = NULL;
203 struct lxc_list *networks = &conf->network;
204 struct lxc_list *insert = networks;
205
206 /* lookup network */
207 if (!lxc_list_empty(networks)) {
208 lxc_list_for_each(insert, networks) {
209 netdev = insert->elem;
210 if (netdev->idx == idx)
211 return netdev;
212 else if (netdev->idx > idx)
213 break;
214 }
215 }
216
217 if (!allocate)
2a655c0d 218 return ret_set_errno(NULL, EINVAL);
c302b476
CB
219
220 return lxc_network_add(insert, idx, true);
221}
222
1ed6ba91
CB
223void lxc_log_configured_netdevs(const struct lxc_conf *conf)
224{
225 struct lxc_netdev *netdev;
226 struct lxc_list *it = (struct lxc_list *)&conf->network;;
227
228 if ((conf->loglevel != LXC_LOG_LEVEL_TRACE) &&
229 (lxc_log_get_level() != LXC_LOG_LEVEL_TRACE))
230 return;
231
232 if (lxc_list_empty(it)) {
233 TRACE("container has no networks configured");
234 return;
235 }
236
237 lxc_list_for_each(it, &conf->network) {
9b0df30f
CB
238 struct lxc_list *cur, *next;
239 struct lxc_inetdev *inet4dev;
240 struct lxc_inet6dev *inet6dev;
241 char bufinet4[INET_ADDRSTRLEN], bufinet6[INET6_ADDRSTRLEN];
242
1ed6ba91
CB
243 netdev = it->elem;
244
c302b476 245 TRACE("index: %zd", netdev->idx);
7a582518 246 TRACE("ifindex: %d", netdev->ifindex);
29c98ddd 247
1ed6ba91
CB
248 switch (netdev->type) {
249 case LXC_NET_VETH:
250 TRACE("type: veth");
134ded24 251 TRACE("veth mode: %d", netdev->priv.veth_attr.mode);
29c98ddd 252
de4855a8 253 if (netdev->priv.veth_attr.pair[0] != '\0')
9b0df30f
CB
254 TRACE("veth pair: %s",
255 netdev->priv.veth_attr.pair);
29c98ddd 256
8ce727fc
CB
257 if (netdev->priv.veth_attr.veth1[0] != '\0')
258 TRACE("veth1 : %s",
259 netdev->priv.veth_attr.veth1);
29c98ddd 260
d952b351
CB
261 if (netdev->priv.veth_attr.ifindex > 0)
262 TRACE("host side ifindex for veth device: %d",
263 netdev->priv.veth_attr.ifindex);
134ded24
TP
264
265 if (netdev->priv.veth_attr.vlan_id_set)
266 TRACE("veth vlan id: %d", netdev->priv.veth_attr.vlan_id);
267
1f92ddc1
TP
268 lxc_list_for_each_safe(cur, &netdev->priv.veth_attr.vlan_tagged_ids, next) {
269 unsigned short vlan_tagged_id = PTR_TO_USHORT(cur->elem);
270 TRACE("veth vlan tagged id: %u", vlan_tagged_id);
271 }
272
1ed6ba91
CB
273 break;
274 case LXC_NET_MACVLAN:
275 TRACE("type: macvlan");
29c98ddd 276
9b0df30f 277 if (netdev->priv.macvlan_attr.mode > 0) {
7b15813c 278 char *mode;
29c98ddd 279
7b15813c 280 mode = lxc_macvlan_flag_to_mode(
9b0df30f
CB
281 netdev->priv.macvlan_attr.mode);
282 TRACE("macvlan mode: %s",
7b15813c 283 mode ? mode : "(invalid mode)");
9b0df30f 284 }
1ed6ba91 285 break;
c9f52382 286 case LXC_NET_IPVLAN:
287 TRACE("type: ipvlan");
288
289 char *mode;
290 mode = lxc_ipvlan_flag_to_mode(netdev->priv.ipvlan_attr.mode);
291 TRACE("ipvlan mode: %s", mode ? mode : "(invalid mode)");
292
293 char *isolation;
294 isolation = lxc_ipvlan_flag_to_isolation(netdev->priv.ipvlan_attr.isolation);
295 TRACE("ipvlan isolation: %s", isolation ? isolation : "(invalid isolation)");
296 break;
1ed6ba91
CB
297 case LXC_NET_VLAN:
298 TRACE("type: vlan");
9b0df30f 299 TRACE("vlan id: %d", netdev->priv.vlan_attr.vid);
1ed6ba91
CB
300 break;
301 case LXC_NET_PHYS:
302 TRACE("type: phys");
29c98ddd 303
304 if (netdev->priv.phys_attr.ifindex > 0)
b809f232
CB
305 TRACE("host side ifindex for phys device: %d",
306 netdev->priv.phys_attr.ifindex);
1ed6ba91
CB
307 break;
308 case LXC_NET_EMPTY:
309 TRACE("type: empty");
310 break;
311 case LXC_NET_NONE:
312 TRACE("type: none");
313 break;
314 default:
d4a7da46 315 ERROR("Invalid network type %d", netdev->type);
1ed6ba91
CB
316 return;
317 }
318
9b0df30f
CB
319 if (netdev->type != LXC_NET_EMPTY) {
320 TRACE("flags: %s",
321 netdev->flags == IFF_UP ? "up" : "none");
29c98ddd 322
de4855a8 323 if (netdev->link[0] != '\0')
9b0df30f 324 TRACE("link: %s", netdev->link);
29c98ddd 325
6509154d 326 /* l2proxy only used when link is specified */
327 if (netdev->link[0] != '\0')
328 TRACE("l2proxy: %s", netdev->l2proxy ? "true" : "false");
329
de4855a8 330 if (netdev->name[0] != '\0')
9b0df30f 331 TRACE("name: %s", netdev->name);
29c98ddd 332
9b0df30f
CB
333 if (netdev->hwaddr)
334 TRACE("hwaddr: %s", netdev->hwaddr);
29c98ddd 335
9b0df30f
CB
336 if (netdev->mtu)
337 TRACE("mtu: %s", netdev->mtu);
29c98ddd 338
9b0df30f
CB
339 if (netdev->upscript)
340 TRACE("upscript: %s", netdev->upscript);
29c98ddd 341
9b0df30f
CB
342 if (netdev->downscript)
343 TRACE("downscript: %s", netdev->downscript);
344
345 TRACE("ipv4 gateway auto: %s",
346 netdev->ipv4_gateway_auto ? "true" : "false");
347
a2f9a670 348 TRACE("ipv4 gateway dev: %s",
349 netdev->ipv4_gateway_dev ? "true" : "false");
350
9b0df30f
CB
351 if (netdev->ipv4_gateway) {
352 inet_ntop(AF_INET, netdev->ipv4_gateway,
353 bufinet4, sizeof(bufinet4));
354 TRACE("ipv4 gateway: %s", bufinet4);
355 }
356
357 lxc_list_for_each_safe(cur, &netdev->ipv4, next) {
358 inet4dev = cur->elem;
359 inet_ntop(AF_INET, &inet4dev->addr, bufinet4,
360 sizeof(bufinet4));
361 TRACE("ipv4 addr: %s", bufinet4);
362 }
363
364 TRACE("ipv6 gateway auto: %s",
365 netdev->ipv6_gateway_auto ? "true" : "false");
29c98ddd 366
a2f9a670 367 TRACE("ipv6 gateway dev: %s",
368 netdev->ipv6_gateway_dev ? "true" : "false");
369
9b0df30f
CB
370 if (netdev->ipv6_gateway) {
371 inet_ntop(AF_INET6, netdev->ipv6_gateway,
372 bufinet6, sizeof(bufinet6));
373 TRACE("ipv6 gateway: %s", bufinet6);
374 }
29c98ddd 375
9b0df30f
CB
376 lxc_list_for_each_safe(cur, &netdev->ipv6, next) {
377 inet6dev = cur->elem;
378 inet_ntop(AF_INET6, &inet6dev->addr, bufinet6,
379 sizeof(bufinet6));
380 TRACE("ipv6 addr: %s", bufinet6);
381 }
d4a7da46 382
383 if (netdev->type == LXC_NET_VETH) {
384 lxc_list_for_each_safe(cur, &netdev->priv.veth_attr.ipv4_routes, next) {
385 inet4dev = cur->elem;
386 if (!inet_ntop(AF_INET, &inet4dev->addr, bufinet4, sizeof(bufinet4))) {
387 ERROR("Invalid ipv4 veth route");
388 return;
389 }
390
391 TRACE("ipv4 veth route: %s/%u", bufinet4, inet4dev->prefix);
392 }
393
394 lxc_list_for_each_safe(cur, &netdev->priv.veth_attr.ipv6_routes, next) {
395 inet6dev = cur->elem;
396 if (!inet_ntop(AF_INET6, &inet6dev->addr, bufinet6, sizeof(bufinet6))) {
397 ERROR("Invalid ipv6 veth route");
398 return;
399 }
400
401 TRACE("ipv6 veth route: %s/%u", bufinet6, inet6dev->prefix);
402 }
403 }
9b0df30f 404 }
1ed6ba91
CB
405 }
406}
519df1c1 407
e5d2fd7c
CB
408static void lxc_free_netdev(struct lxc_netdev *netdev)
409{
410 struct lxc_list *cur, *next;
411
06db6101
CB
412 if (!netdev)
413 return;
414
e5d2fd7c
CB
415 free(netdev->upscript);
416 free(netdev->downscript);
417 free(netdev->hwaddr);
418 free(netdev->mtu);
419
420 free(netdev->ipv4_gateway);
421 lxc_list_for_each_safe(cur, &netdev->ipv4, next) {
422 lxc_list_del(cur);
423 free(cur->elem);
424 free(cur);
425 }
426
427 free(netdev->ipv6_gateway);
428 lxc_list_for_each_safe(cur, &netdev->ipv6, next) {
429 lxc_list_del(cur);
430 free(cur->elem);
431 free(cur);
432 }
433
d4a7da46 434 if (netdev->type == LXC_NET_VETH) {
435 lxc_list_for_each_safe(cur, &netdev->priv.veth_attr.ipv4_routes, next) {
436 lxc_list_del(cur);
437 free(cur->elem);
438 free(cur);
439 }
440
441 lxc_list_for_each_safe(cur, &netdev->priv.veth_attr.ipv6_routes, next) {
442 lxc_list_del(cur);
443 free(cur->elem);
444 free(cur);
445 }
3a0049f3
TP
446
447 lxc_list_for_each_safe(cur, &netdev->priv.veth_attr.vlan_tagged_ids, next) {
448 lxc_list_del(cur);
449 free(cur);
450 }
d4a7da46 451 }
452
e5d2fd7c
CB
453 free(netdev);
454}
455
06db6101
CB
456define_cleanup_function(struct lxc_netdev *, lxc_free_netdev);
457
519df1c1
CB
458bool lxc_remove_nic_by_idx(struct lxc_conf *conf, unsigned int idx)
459{
06db6101 460 call_cleaner(lxc_free_netdev) struct lxc_netdev *netdev = NULL;
e5d2fd7c 461 struct lxc_list *cur, *next;
519df1c1
CB
462
463 lxc_list_for_each_safe(cur, &conf->network, next) {
464 netdev = cur->elem;
465 if (netdev->idx != idx)
466 continue;
467
468 lxc_list_del(cur);
06db6101
CB
469 free(cur);
470 return true;
519df1c1
CB
471 }
472
06db6101 473 return false;
519df1c1 474}
e5d2fd7c 475
c302b476 476void lxc_free_networks(struct lxc_list *networks)
e5d2fd7c
CB
477{
478 struct lxc_list *cur, *next;
e5d2fd7c 479
89d66b41
CB
480 lxc_list_for_each_safe (cur, networks, next) {
481 struct lxc_netdev *netdev = cur->elem;
e5d2fd7c
CB
482 netdev = cur->elem;
483 lxc_free_netdev(netdev);
484 free(cur);
485 }
486
487 /* prevent segfaults */
c302b476 488 lxc_list_init(networks);
e5d2fd7c 489}
9b0df30f 490
3f0ed090
TP
491static struct lxc_veth_mode {
492 char *name;
493 int mode;
494} veth_mode[] = {
ecf953c5
CB
495 { "bridge", VETH_MODE_BRIDGE },
496 { "router", VETH_MODE_ROUTER },
3f0ed090
TP
497};
498
499int lxc_veth_mode_to_flag(int *mode, const char *value)
500{
501 for (size_t i = 0; i < sizeof(veth_mode) / sizeof(veth_mode[0]); i++) {
502 if (strcmp(veth_mode[i].name, value) != 0)
503 continue;
504
505 *mode = veth_mode[i].mode;
506 return 0;
507 }
508
9e75cf7a 509 return ret_errno(EINVAL);
3f0ed090
TP
510}
511
756cadb6
CB
512char *lxc_veth_flag_to_mode(int mode)
513{
514 for (size_t i = 0; i < sizeof(veth_mode) / sizeof(veth_mode[0]); i++) {
515 if (veth_mode[i].mode != mode)
516 continue;
517
518 return veth_mode[i].name;
519 }
520
97ea2c2d 521 return ret_set_errno(NULL, EINVAL);
756cadb6
CB
522}
523
7b15813c 524static struct lxc_macvlan_mode {
9b0df30f
CB
525 char *name;
526 int mode;
527} macvlan_mode[] = {
faf7e3ba
CB
528 { "private", MACVLAN_MODE_PRIVATE },
529 { "vepa", MACVLAN_MODE_VEPA },
530 { "bridge", MACVLAN_MODE_BRIDGE },
531 { "passthru", MACVLAN_MODE_PASSTHRU },
9b0df30f
CB
532};
533
534int lxc_macvlan_mode_to_flag(int *mode, const char *value)
535{
fa204110 536 for (size_t i = 0; i < sizeof(macvlan_mode) / sizeof(macvlan_mode[0]); i++) {
9b0df30f
CB
537 if (strcmp(macvlan_mode[i].name, value))
538 continue;
539
540 *mode = macvlan_mode[i].mode;
541 return 0;
542 }
543
fa204110 544 return ret_errno(EINVAL);
9b0df30f
CB
545}
546
547char *lxc_macvlan_flag_to_mode(int mode)
548{
65066407 549 for (size_t i = 0; i < sizeof(macvlan_mode) / sizeof(macvlan_mode[0]); i++) {
b56680fd 550 if (macvlan_mode[i].mode != mode)
9b0df30f
CB
551 continue;
552
553 return macvlan_mode[i].name;
554 }
555
65066407 556 return ret_set_errno(NULL, EINVAL);
9b0df30f 557}
f9373e40 558
c9f52382 559static struct lxc_ipvlan_mode {
560 char *name;
561 int mode;
562} ipvlan_mode[] = {
cdc5e017
CB
563 { "l3", IPVLAN_MODE_L3 },
564 { "l3s", IPVLAN_MODE_L3S },
565 { "l2", IPVLAN_MODE_L2 },
c9f52382 566};
567
568int lxc_ipvlan_mode_to_flag(int *mode, const char *value)
569{
570 for (size_t i = 0; i < sizeof(ipvlan_mode) / sizeof(ipvlan_mode[0]); i++) {
571 if (strcmp(ipvlan_mode[i].name, value) != 0)
572 continue;
573
574 *mode = ipvlan_mode[i].mode;
575 return 0;
576 }
577
345c0c49 578 return ret_errno(EINVAL);
c9f52382 579}
580
581char *lxc_ipvlan_flag_to_mode(int mode)
582{
583 for (size_t i = 0; i < sizeof(ipvlan_mode) / sizeof(ipvlan_mode[0]); i++) {
584 if (ipvlan_mode[i].mode != mode)
585 continue;
586
587 return ipvlan_mode[i].name;
588 }
589
c789d162 590 return ret_set_errno(NULL, EINVAL);
c9f52382 591}
592
593static struct lxc_ipvlan_isolation {
594 char *name;
595 int flag;
596} ipvlan_isolation[] = {
11e5a00f
CB
597 { "bridge", IPVLAN_ISOLATION_BRIDGE },
598 { "private", IPVLAN_ISOLATION_PRIVATE },
599 { "vepa", IPVLAN_ISOLATION_VEPA },
c9f52382 600};
601
602int lxc_ipvlan_isolation_to_flag(int *flag, const char *value)
603{
604 for (size_t i = 0; i < sizeof(ipvlan_isolation) / sizeof(ipvlan_isolation[0]); i++) {
605 if (strcmp(ipvlan_isolation[i].name, value) != 0)
606 continue;
607
608 *flag = ipvlan_isolation[i].flag;
609 return 0;
610 }
611
f2713131 612 return ret_errno(EINVAL);
c9f52382 613}
614
615char *lxc_ipvlan_flag_to_isolation(int flag)
616{
617 for (size_t i = 0; i < sizeof(ipvlan_isolation) / sizeof(ipvlan_isolation[0]); i++) {
618 if (ipvlan_isolation[i].flag != flag)
619 continue;
620
621 return ipvlan_isolation[i].name;
622 }
623
6998880b 624 return ret_set_errno(NULL, EINVAL);
c9f52382 625}
626
f9373e40
CB
627int set_config_string_item(char **conf_item, const char *value)
628{
629 char *new_value;
630
631 if (lxc_config_value_empty(value)) {
f4d287ea 632 free_disarm(*conf_item);
f9373e40
CB
633 return 0;
634 }
635
636 new_value = strdup(value);
f4d287ea
CB
637 if (!new_value)
638 return log_error_errno(-ENOMEM, ENOMEM, "Failed to duplicate string \"%s\"", value);
f9373e40 639
f4d287ea 640 free_move_ptr(*conf_item, new_value);
f9373e40
CB
641 return 0;
642}
643
644int set_config_string_item_max(char **conf_item, const char *value, size_t max)
645{
21af2fbe
CB
646 if (strlen(value) >= max)
647 return log_error_errno(-ENAMETOOLONG, ENAMETOOLONG, "%s is too long (>= %lu)", value, (unsigned long)max);
f9373e40
CB
648
649 return set_config_string_item(conf_item, value);
650}
651
652int set_config_path_item(char **conf_item, const char *value)
653{
654 return set_config_string_item_max(conf_item, value, PATH_MAX);
655}
656
8f818a84
MB
657int set_config_bool_item(bool *conf_item, const char *value, bool empty_conf_action)
658{
4f3de2ac 659 int ret;
8f818a84
MB
660 unsigned int val = 0;
661
662 if (lxc_config_value_empty(value)) {
663 *conf_item = empty_conf_action;
664 return 0;
665 }
666
4f3de2ac
CB
667 ret = lxc_safe_uint(value, &val);
668 if (ret < 0)
669 return ret;
8f818a84
MB
670
671 switch (val) {
672 case 0:
673 *conf_item = false;
674 return 0;
675 case 1:
676 *conf_item = true;
677 return 0;
678 }
679
4f3de2ac 680 return ret_errno(EINVAL);
8f818a84
MB
681}
682
f9373e40
CB
683int config_ip_prefix(struct in_addr *addr)
684{
685 if (IN_CLASSA(addr->s_addr))
686 return 32 - IN_CLASSA_NSHIFT;
29c98ddd 687
f9373e40
CB
688 if (IN_CLASSB(addr->s_addr))
689 return 32 - IN_CLASSB_NSHIFT;
29c98ddd 690
f9373e40
CB
691 if (IN_CLASSC(addr->s_addr))
692 return 32 - IN_CLASSC_NSHIFT;
693
694 return 0;
695}
696
18cd4b54 697int network_ifname(char *valuep, const char *value, size_t size)
f9373e40 698{
18cd4b54
DJ
699 size_t retlen;
700
701 if (!valuep || !value)
ffb7e0f6 702 return ret_errno(EINVAL);
18cd4b54
DJ
703
704 retlen = strlcpy(valuep, value, size);
29c98ddd 705 if (retlen >= size)
ffb7e0f6 706 ERROR("Network device name \"%s\" is too long (>= %zu)", value, size);
de4855a8 707
de4855a8 708 return 0;
f9373e40
CB
709}
710
3db41a6c
CB
711bool lxc_config_net_is_hwaddr(const char *line)
712{
713 unsigned index;
714 char tmp[7];
715
716 if (strncmp(line, "lxc.net", 7) != 0)
717 return false;
718
719 if (strncmp(line, "lxc.net.hwaddr", 14) == 0)
720 return true;
721
722 if (strncmp(line, "lxc.network.hwaddr", 18) == 0)
723 return true;
724
725 if (sscanf(line, "lxc.net.%u.%6s", &index, tmp) == 2 ||
726 sscanf(line, "lxc.network.%u.%6s", &index, tmp) == 2)
727 return strncmp(tmp, "hwaddr", 6) == 0;
728
729 return false;
730}
731
29c98ddd 732void rand_complete_hwaddr(char *hwaddr)
f9373e40
CB
733{
734 const char hex[] = "0123456789abcdef";
735 char *curs = hwaddr;
280cc35f 736#ifdef HAVE_RAND_R
f9373e40
CB
737 unsigned int seed;
738
739 seed = randseed(false);
280cc35f 740#else
741
742 (void)randseed(true);
f9373e40 743#endif
280cc35f 744
f9373e40
CB
745 while (*curs != '\0' && *curs != '\n') {
746 if (*curs == 'x' || *curs == 'X') {
747 if (curs - hwaddr == 1) {
748 /* ensure address is unicast */
749#ifdef HAVE_RAND_R
750 *curs = hex[rand_r(&seed) & 0x0E];
751 } else {
752 *curs = hex[rand_r(&seed) & 0x0F];
753#else
754 *curs = hex[rand() & 0x0E];
755 } else {
756 *curs = hex[rand() & 0x0F];
757#endif
758 }
759 }
760 curs++;
761 }
f9373e40
CB
762}
763
f9373e40
CB
764bool new_hwaddr(char *hwaddr)
765{
766 int ret;
280cc35f 767#ifdef HAVE_RAND_R
768 unsigned int seed;
769
770 seed = randseed(false);
771
772 ret = snprintf(hwaddr, 18, "00:16:3e:%02x:%02x:%02x", rand_r(&seed) % 255,
773 rand_r(&seed) % 255, rand_r(&seed) % 255);
774#else
f9373e40
CB
775
776 (void)randseed(true);
777
778 ret = snprintf(hwaddr, 18, "00:16:3e:%02x:%02x:%02x", rand() % 255,
779 rand() % 255, rand() % 255);
280cc35f 780#endif
f9373e40 781 if (ret < 0 || ret >= 18) {
f6261b46 782 return log_error_errno(false, EIO, "Failed to call snprintf()");
f9373e40
CB
783 }
784
785 return true;
786}
953fe44f
CB
787
788int lxc_get_conf_str(char *retv, int inlen, const char *value)
789{
d3bdf12c
CB
790 size_t value_len;
791
953fe44f
CB
792 if (!value)
793 return 0;
d3bdf12c
CB
794
795 value_len = strlen(value);
796 if (retv && inlen >= value_len + 1)
797 memcpy(retv, value, value_len + 1);
953fe44f 798
29c98ddd 799 return value_len;
953fe44f
CB
800}
801
6e54330c
CB
802int lxc_get_conf_bool(struct lxc_conf *c, char *retv, int inlen, bool v)
803{
804 int len;
805 int fulllen = 0;
806
807 if (!retv)
808 inlen = 0;
809 else
810 memset(retv, 0, inlen);
811
812 strprint(retv, inlen, "%d", v);
813
814 return fulllen;
815}
816
953fe44f
CB
817int lxc_get_conf_int(struct lxc_conf *c, char *retv, int inlen, int v)
818{
1396b610
DJ
819 int len;
820 int fulllen = 0;
821
953fe44f
CB
822 if (!retv)
823 inlen = 0;
824 else
825 memset(retv, 0, inlen);
826
1396b610
DJ
827 strprint(retv, inlen, "%d", v);
828
829 return fulllen;
953fe44f 830}
f7662514 831
885766f5
CB
832int lxc_get_conf_size_t(struct lxc_conf *c, char *retv, int inlen, size_t v)
833{
1396b610
DJ
834 int len;
835 int fulllen = 0;
836
885766f5
CB
837 if (!retv)
838 inlen = 0;
839 else
840 memset(retv, 0, inlen);
841
1396b610
DJ
842 strprint(retv, inlen, "%zu", v);
843
844 return fulllen;
885766f5
CB
845}
846
2ea479c9
CB
847int lxc_get_conf_uint64(struct lxc_conf *c, char *retv, int inlen, uint64_t v)
848{
1396b610
DJ
849 int len;
850 int fulllen = 0;
851
2ea479c9
CB
852 if (!retv)
853 inlen = 0;
854 else
855 memset(retv, 0, inlen);
856
1396b610
DJ
857 strprint(retv, inlen, "%"PRIu64, v);
858
859 return fulllen;
2ea479c9
CB
860}
861
28d9e29e
CB
862static int lxc_container_name_to_pid(const char *lxcname_or_pid,
863 const char *lxcpath)
864{
865 int ret;
866 signed long int pid;
867 char *err = NULL;
868
869 pid = strtol(lxcname_or_pid, &err, 10);
870 if (*err != '\0' || pid < 1) {
fd47e5f1 871 __put_lxc_container struct lxc_container *c = NULL;
28d9e29e
CB
872
873 c = lxc_container_new(lxcname_or_pid, lxcpath);
fd47e5f1
CB
874 if (!c)
875 return log_error_errno(-EINVAL, EINVAL, "\"%s\" is not a valid pid nor a container name", lxcname_or_pid);
28d9e29e 876
fd47e5f1
CB
877 if (!c->may_control(c))
878 return log_error_errno(-EPERM, EPERM, "Insufficient privileges to control container \"%s\"", c->name);
28d9e29e
CB
879
880 pid = c->init_pid(c);
fd47e5f1
CB
881 if (pid < 1)
882 return log_error_errno(-EINVAL, EINVAL, "Container \"%s\" is not running", c->name);
28d9e29e 883
28d9e29e
CB
884 }
885
886 ret = kill(pid, 0);
fd47e5f1
CB
887 if (ret < 0)
888 return log_error_errno(-errno, errno, "Failed to send signal to pid %d", (int)pid);
28d9e29e
CB
889
890 return pid;
891}
892
39e6fd36 893int lxc_inherit_namespace(const char *nsfd_path, const char *lxcpath,
28d9e29e
CB
894 const char *namespace)
895{
a011ec99 896 __do_free char *dup = NULL;
28d9e29e 897 int fd, pid;
a011ec99 898 char *lastslash;
28d9e29e 899
39e6fd36
SH
900 if (nsfd_path[0] == '/') {
901 return open(nsfd_path, O_RDONLY | O_CLOEXEC);
902 }
903
904 lastslash = strrchr(nsfd_path, '/');
28d9e29e 905 if (lastslash) {
39e6fd36 906 dup = strdup(nsfd_path);
28d9e29e 907 if (!dup)
a011ec99 908 return ret_errno(ENOMEM);
28d9e29e 909
39e6fd36 910 dup[lastslash - nsfd_path] = '\0';
a011ec99
CB
911 lxcpath = lastslash + 1;
912 nsfd_path = lastslash + 1;
28d9e29e
CB
913 }
914
a011ec99 915 pid = lxc_container_name_to_pid(nsfd_path, lxcpath);
28d9e29e 916 if (pid < 0)
a011ec99 917 return pid;
28d9e29e
CB
918
919 fd = lxc_preserve_ns(pid, namespace);
920 if (fd < 0)
a011ec99 921 return -errno;
28d9e29e
CB
922
923 return fd;
924}
f6e32eb0
CB
925
926struct signame {
927 int num;
928 const char *name;
929};
930
931static const struct signame signames[] = {
932 { SIGHUP, "HUP" },
933 { SIGINT, "INT" },
934 { SIGQUIT, "QUIT" },
935 { SIGILL, "ILL" },
936 { SIGABRT, "ABRT" },
937 { SIGFPE, "FPE" },
938 { SIGKILL, "KILL" },
939 { SIGSEGV, "SEGV" },
940 { SIGPIPE, "PIPE" },
941 { SIGALRM, "ALRM" },
942 { SIGTERM, "TERM" },
943 { SIGUSR1, "USR1" },
944 { SIGUSR2, "USR2" },
945 { SIGCHLD, "CHLD" },
946 { SIGCONT, "CONT" },
947 { SIGSTOP, "STOP" },
948 { SIGTSTP, "TSTP" },
949 { SIGTTIN, "TTIN" },
950 { SIGTTOU, "TTOU" },
951#ifdef SIGTRAP
952 { SIGTRAP, "TRAP" },
953#endif
954#ifdef SIGIOT
955 { SIGIOT, "IOT" },
956#endif
957#ifdef SIGEMT
958 { SIGEMT, "EMT" },
959#endif
960#ifdef SIGBUS
961 { SIGBUS, "BUS" },
962#endif
963#ifdef SIGSTKFLT
964 { SIGSTKFLT, "STKFLT" },
965#endif
966#ifdef SIGCLD
967 { SIGCLD, "CLD" },
968#endif
969#ifdef SIGURG
970 { SIGURG, "URG" },
971#endif
972#ifdef SIGXCPU
973 { SIGXCPU, "XCPU" },
974#endif
975#ifdef SIGXFSZ
976 { SIGXFSZ, "XFSZ" },
977#endif
978#ifdef SIGVTALRM
979 { SIGVTALRM, "VTALRM" },
980#endif
981#ifdef SIGPROF
982 { SIGPROF, "PROF" },
983#endif
984#ifdef SIGWINCH
985 { SIGWINCH, "WINCH" },
986#endif
987#ifdef SIGIO
988 { SIGIO, "IO" },
989#endif
990#ifdef SIGPOLL
991 { SIGPOLL, "POLL" },
992#endif
993#ifdef SIGINFO
994 { SIGINFO, "INFO" },
995#endif
996#ifdef SIGLOST
997 { SIGLOST, "LOST" },
998#endif
999#ifdef SIGPWR
1000 { SIGPWR, "PWR" },
1001#endif
1002#ifdef SIGUNUSED
1003 { SIGUNUSED, "UNUSED" },
1004#endif
1005#ifdef SIGSYS
1006 { SIGSYS, "SYS" },
1007#endif
1008};
1009
1010static int sig_num(const char *sig)
1011{
50692dc1 1012 int ret;
f6e32eb0
CB
1013 unsigned int signum;
1014
50692dc1
CB
1015 ret = lxc_safe_uint(sig, &signum);
1016 if (ret < 0)
1017 return ret;
f6e32eb0
CB
1018
1019 return signum;
1020}
1021
1022static int rt_sig_num(const char *signame)
1023{
1024 int rtmax = 0, sig_n = 0;
1025
29c98ddd 1026 if (strncasecmp(signame, "max-", 4) == 0)
f6e32eb0 1027 rtmax = 1;
f6e32eb0
CB
1028
1029 signame += 4;
1030 if (!isdigit(*signame))
2a169aec 1031 return ret_errno(EINVAL);
f6e32eb0
CB
1032
1033 sig_n = sig_num(signame);
1034 sig_n = rtmax ? SIGRTMAX - sig_n : SIGRTMIN + sig_n;
1035 if (sig_n > SIGRTMAX || sig_n < SIGRTMIN)
2a169aec 1036 return ret_errno(EINVAL);
f6e32eb0
CB
1037
1038 return sig_n;
1039}
1040
1041int sig_parse(const char *signame)
1042{
1043 size_t n;
1044
1045 if (isdigit(*signame)) {
1046 return sig_num(signame);
1047 } else if (strncasecmp(signame, "sig", 3) == 0) {
1048 signame += 3;
1049 if (strncasecmp(signame, "rt", 2) == 0)
1050 return rt_sig_num(signame + 2);
29c98ddd 1051
1052 for (n = 0; n < sizeof(signames) / sizeof((signames)[0]); n++)
f6e32eb0
CB
1053 if (strcasecmp(signames[n].name, signame) == 0)
1054 return signames[n].num;
f6e32eb0
CB
1055 }
1056
546d016e 1057 return ret_errno(EINVAL);
f6e32eb0 1058}