mirror of
https://github.com/morgan9e/systemd
synced 2026-04-15 00:47:10 +09:00
Amazon EC2 Nitro hypervisor is technically based on KVM[1], which
systemd-detect-virt identify propely from CPUID. However the lack of
CPUID on aarch64 (A1, T4 instance type) prevents a correct
identification, impacting hostnamectl and systemd-random-seed. Instead
it's possible to identify virtualization from DMI vendor ID.
Prior to this commit:
# hostnamectl
Static hostname: n/a
Transient hostname: ip-10-97-8-12
Icon name: computer
Machine ID: 8e3772fbcfa3dd6f330a12ff5df5a63b
Boot ID: b7b7e2fe0079448db664839df59f9817
Operating System: Gentoo/Linux
Kernel: Linux 5.4.69-longterm
Architecture: arm64
After this commit:
# hostnamectl
Static hostname: n/a
Transient hostname: ip-10-97-8-12
Icon name: computer-vm
Chassis: vm
Machine ID: 8e3772fbcfa3dd6f330a12ff5df5a63b
Boot ID: bd04da57084e41078f20541101867113
Virtualization: amazon
Operating System: Gentoo/Linux
Kernel: Linux 5.4.69-longterm
Architecture: arm64
[1] https://aws.amazon.com/ec2/faqs/
66 lines
1.8 KiB
C
66 lines
1.8 KiB
C
/* SPDX-License-Identifier: LGPL-2.1-or-later */
|
|
#pragma once
|
|
|
|
#include <stdbool.h>
|
|
|
|
#include "macro.h"
|
|
|
|
enum {
|
|
VIRTUALIZATION_NONE = 0,
|
|
|
|
VIRTUALIZATION_VM_FIRST,
|
|
VIRTUALIZATION_KVM = VIRTUALIZATION_VM_FIRST,
|
|
VIRTUALIZATION_AMAZON,
|
|
VIRTUALIZATION_QEMU,
|
|
VIRTUALIZATION_BOCHS,
|
|
VIRTUALIZATION_XEN,
|
|
VIRTUALIZATION_UML,
|
|
VIRTUALIZATION_VMWARE,
|
|
VIRTUALIZATION_ORACLE,
|
|
VIRTUALIZATION_MICROSOFT,
|
|
VIRTUALIZATION_ZVM,
|
|
VIRTUALIZATION_PARALLELS,
|
|
VIRTUALIZATION_BHYVE,
|
|
VIRTUALIZATION_QNX,
|
|
VIRTUALIZATION_ACRN,
|
|
VIRTUALIZATION_POWERVM,
|
|
VIRTUALIZATION_VM_OTHER,
|
|
VIRTUALIZATION_VM_LAST = VIRTUALIZATION_VM_OTHER,
|
|
|
|
VIRTUALIZATION_CONTAINER_FIRST,
|
|
VIRTUALIZATION_SYSTEMD_NSPAWN = VIRTUALIZATION_CONTAINER_FIRST,
|
|
VIRTUALIZATION_LXC_LIBVIRT,
|
|
VIRTUALIZATION_LXC,
|
|
VIRTUALIZATION_OPENVZ,
|
|
VIRTUALIZATION_DOCKER,
|
|
VIRTUALIZATION_PODMAN,
|
|
VIRTUALIZATION_RKT,
|
|
VIRTUALIZATION_WSL,
|
|
VIRTUALIZATION_PROOT,
|
|
VIRTUALIZATION_POUCH,
|
|
VIRTUALIZATION_CONTAINER_OTHER,
|
|
VIRTUALIZATION_CONTAINER_LAST = VIRTUALIZATION_CONTAINER_OTHER,
|
|
|
|
_VIRTUALIZATION_MAX,
|
|
_VIRTUALIZATION_INVALID = -EINVAL,
|
|
};
|
|
|
|
static inline bool VIRTUALIZATION_IS_VM(int x) {
|
|
return x >= VIRTUALIZATION_VM_FIRST && x <= VIRTUALIZATION_VM_LAST;
|
|
}
|
|
|
|
static inline bool VIRTUALIZATION_IS_CONTAINER(int x) {
|
|
return x >= VIRTUALIZATION_CONTAINER_FIRST && x <= VIRTUALIZATION_CONTAINER_LAST;
|
|
}
|
|
|
|
int detect_vm(void);
|
|
int detect_container(void);
|
|
int detect_virtualization(void);
|
|
|
|
int running_in_userns(void);
|
|
int running_in_chroot(void);
|
|
|
|
const char *virtualization_to_string(int v) _const_;
|
|
int virtualization_from_string(const char *s) _pure_;
|
|
bool has_cpu_with_flag(const char *flag);
|