]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/nspawn/nspawn-mount.h
nspawn: add support for executing OCI runtime bundles with nspawn
[thirdparty/systemd.git] / src / nspawn / nspawn-mount.h
CommitLineData
53e1b683 1/* SPDX-License-Identifier: LGPL-2.1+ */
e83bebef
LP
2#pragma once
3
e83bebef
LP
4#include <stdbool.h>
5
5da38d07 6#include "cgroup-util.h"
a4c35b6b 7#include "volatile-util.h"
5da38d07 8
4f086aab 9typedef enum MountSettingsMask {
ef31828d
LP
10 MOUNT_FATAL = 1 << 0, /* if set, a mount error is considered fatal */
11 MOUNT_USE_USERNS = 1 << 1, /* if set, mounts are patched considering uid/gid shifts in a user namespace */
12 MOUNT_IN_USERNS = 1 << 2, /* if set, the mount is executed in the inner child, otherwise in the outer child */
13 MOUNT_APPLY_APIVFS_RO = 1 << 3, /* if set, /proc/sys, and /sys will be mounted read-only, otherwise read-write. */
14 MOUNT_APPLY_APIVFS_NETNS = 1 << 4, /* if set, /proc/sys/net will be mounted read-write.
d4b653c5 15 Works only if MOUNT_APPLY_APIVFS_RO is also set. */
de40a303 16 MOUNT_APPLY_TMPFS_TMP = 1 << 5, /* if set, /tmp will be mounted as tmpfs */
4f086aab
SU
17} MountSettingsMask;
18
e83bebef
LP
19typedef enum CustomMountType {
20 CUSTOM_MOUNT_BIND,
21 CUSTOM_MOUNT_TMPFS,
22 CUSTOM_MOUNT_OVERLAY,
de40a303
LP
23 CUSTOM_MOUNT_INACCESSIBLE,
24 CUSTOM_MOUNT_ARBITRARY,
e83bebef
LP
25 _CUSTOM_MOUNT_TYPE_MAX,
26 _CUSTOM_MOUNT_TYPE_INVALID = -1
27} CustomMountType;
28
29typedef struct CustomMount {
30 CustomMountType type;
31 bool read_only;
32 char *source; /* for overlayfs this is the upper directory */
33 char *destination;
34 char *options;
35 char *work_dir;
36 char **lower;
c7a4890c 37 char *rm_rf_tmpdir;
de40a303
LP
38 char *type_argument; /* only for CUSTOM_MOUNT_ARBITRARY */
39 bool graceful;
40 bool in_userns;
e83bebef
LP
41} CustomMount;
42
88614c8a
LP
43CustomMount* custom_mount_add(CustomMount **l, size_t *n, CustomMountType t);
44void custom_mount_free_all(CustomMount *l, size_t n);
45int custom_mount_prepare_all(const char *dest, CustomMount *l, size_t n);
ad85779a 46
88614c8a
LP
47int bind_mount_parse(CustomMount **l, size_t *n, const char *s, bool read_only);
48int tmpfs_mount_parse(CustomMount **l, size_t *n, const char *s);
49int overlay_mount_parse(CustomMount **l, size_t *n, const char *s, bool read_only);
de40a303 50int inaccessible_mount_parse(CustomMount **l, size_t *n, const char *s);
e83bebef 51
2fa017f1 52int mount_all(const char *dest, MountSettingsMask mount_settings, uid_t uid_shift, const char *selinux_apifs_context);
4f086aab 53int mount_sysfs(const char *dest, MountSettingsMask mount_settings);
e83bebef 54
de40a303 55int mount_custom(const char *dest, CustomMount *mounts, size_t n, bool userns, uid_t uid_shift, uid_t uid_range, const char *selinux_apifs_context, bool in_userns);
e83bebef 56
e5b43a04 57int setup_volatile_mode(const char *directory, VolatileMode mode, bool userns, uid_t uid_shift, uid_t uid_range, const char *selinux_apifs_context);
b53ede69
PW
58
59int pivot_root_parse(char **pivot_root_new, char **pivot_root_old, const char *s);
60int setup_pivot_root(const char *directory, const char *pivot_root_new, const char *pivot_root_old);
04029482
LS
61
62int tmpfs_patch_options(const char *options,uid_t uid_shift, const char *selinux_apifs_context, char **ret);