299a34c11a
Various things don't work when we're running in a user namespace, but it's pretty hard to reliably detect if that is true. A function is added which looks at /proc/self/uid_map and returns false if the default "0 0 UINT32_MAX" is found, and true if it finds anything else. This misses the case where an 1:1 mapping with the full range was used, but I don't know how to distinguish this case. 'systemd-detect-virt --private-users' is very similar to 'systemd-detect-virt --chroot', but we check for a user namespace instead.
75 lines
2.2 KiB
C
75 lines
2.2 KiB
C
#pragma once
|
|
|
|
/***
|
|
This file is part of systemd.
|
|
|
|
Copyright 2011 Lennart Poettering
|
|
|
|
systemd is free software; you can redistribute it and/or modify it
|
|
under the terms of the GNU Lesser General Public License as published by
|
|
the Free Software Foundation; either version 2.1 of the License, or
|
|
(at your option) any later version.
|
|
|
|
systemd is distributed in the hope that it will be useful, but
|
|
WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
Lesser General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Lesser General Public License
|
|
along with systemd; If not, see <http://www.gnu.org/licenses/>.
|
|
***/
|
|
|
|
#include <stdbool.h>
|
|
|
|
#include "macro.h"
|
|
|
|
enum {
|
|
VIRTUALIZATION_NONE = 0,
|
|
|
|
VIRTUALIZATION_VM_FIRST,
|
|
VIRTUALIZATION_KVM = VIRTUALIZATION_VM_FIRST,
|
|
VIRTUALIZATION_QEMU,
|
|
VIRTUALIZATION_BOCHS,
|
|
VIRTUALIZATION_XEN,
|
|
VIRTUALIZATION_UML,
|
|
VIRTUALIZATION_VMWARE,
|
|
VIRTUALIZATION_ORACLE,
|
|
VIRTUALIZATION_MICROSOFT,
|
|
VIRTUALIZATION_ZVM,
|
|
VIRTUALIZATION_PARALLELS,
|
|
VIRTUALIZATION_BHYVE,
|
|
VIRTUALIZATION_VM_OTHER,
|
|
VIRTUALIZATION_VM_LAST = VIRTUALIZATION_VM_OTHER,
|
|
|
|
VIRTUALIZATION_CONTAINER_FIRST,
|
|
VIRTUALIZATION_SYSTEMD_NSPAWN = VIRTUALIZATION_CONTAINER_FIRST,
|
|
VIRTUALIZATION_LXC_LIBVIRT,
|
|
VIRTUALIZATION_LXC,
|
|
VIRTUALIZATION_OPENVZ,
|
|
VIRTUALIZATION_DOCKER,
|
|
VIRTUALIZATION_RKT,
|
|
VIRTUALIZATION_CONTAINER_OTHER,
|
|
VIRTUALIZATION_CONTAINER_LAST = VIRTUALIZATION_CONTAINER_OTHER,
|
|
|
|
_VIRTUALIZATION_MAX,
|
|
_VIRTUALIZATION_INVALID = -1
|
|
};
|
|
|
|
static inline bool VIRTUALIZATION_IS_VM(int x) {
|
|
return x >= VIRTUALIZATION_VM_FIRST && x <= VIRTUALIZATION_VM_LAST;
|
|
}
|
|
|
|
static inline bool VIRTUALIZATION_IS_CONTAINER(int x) {
|
|
return x >= VIRTUALIZATION_CONTAINER_FIRST && x <= VIRTUALIZATION_CONTAINER_LAST;
|
|
}
|
|
|
|
int detect_vm(void);
|
|
int detect_container(void);
|
|
int detect_virtualization(void);
|
|
|
|
int running_in_userns(void);
|
|
int running_in_chroot(void);
|
|
|
|
const char *virtualization_to_string(int v) _const_;
|
|
int virtualization_from_string(const char *s) _pure_;
|