Compare commits

..

2 Commits

Author SHA1 Message Date
Luca Boccassi 8a5201a0f8 detect-virt: check the inode number of the pid namespace
The indoe number of root pid namespace is hardcoded in the kernel to
0xEFFFFFFC since 3.8, so check the inode number of our pid namespace
if all else fails. If it's not 0xEFFFFFFC then we are in a pid
namespace, hence a container environment.

Fixes https://github.com/systemd/systemd/issues/35249
2024-11-21 09:52:53 +00:00
Luca Boccassi c5d5c74671 test: run TEST-74-AUX-UTILS in VM in legacy shell setup too
This was switched for the mkosi-based jobs, but not for the shell
based jobs. Switch the shell jobs too for consistency, otherwise
some tests will work in mkosi and fail in shell, and viceversa.

Follow-up for f4faac2073
2024-11-21 09:52:03 +00:00
2 changed files with 22 additions and 13 deletions

View File

@ -24,6 +24,10 @@
#include "uid-range.h"
#include "virt.h"
/* Root namespace inode number, as per include/linux/proc_ns.h in the kernel source tree, since v3.8:
* https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=98f842e675f96ffac96e6c50315790912b2812be */
#define PROC_PID_INIT_INO UINT64_C(0xEFFFFFFC)
enum {
SMBIOS_VM_BIT_SET,
SMBIOS_VM_BIT_UNSET,
@ -645,6 +649,20 @@ static int running_in_cgroupns(void) {
}
}
static int running_in_pidns(void) {
_cleanup_close_ int pidns_fd = -EBADF;
struct stat st;
pidns_fd = namespace_open_by_type(NAMESPACE_PID);
if (pidns_fd < 0)
return log_debug_errno(pidns_fd, "Failed to open PID namespace, ignoring: %m");
if (fstat(pidns_fd, &st) < 0)
return log_debug_errno(errno, "Failed to fstat pid namespace fd, ignoring: %m");
return (uint64_t) st.st_ino != PROC_PID_INIT_INO;
}
static Virtualization detect_container_files(void) {
static const struct {
const char *file_path;
@ -674,7 +692,6 @@ static Virtualization detect_container_files(void) {
Virtualization detect_container(void) {
static thread_local Virtualization cached_found = _VIRTUALIZATION_INVALID;
_cleanup_free_ char *m = NULL, *o = NULL, *p = NULL;
_cleanup_close_ int pidns_fd = -EBADF;
const char *e = NULL;
Virtualization v;
int r;
@ -799,19 +816,10 @@ check_files:
/* Finally, the root pid namespace has an hardcoded inode number of 0xEFFFFFFC since kernel 3.8, so
* if all else fails we can check the inode number of our pid namespace and compare it. */
pidns_fd = namespace_open_by_type(NAMESPACE_PID);
if (pidns_fd < 0)
log_debug_errno(pidns_fd, "Failed to open PID namespace, ignoring: %m");
else {
struct stat st;
if (fstat(pidns_fd, &st) < 0)
log_debug_errno(errno, "Failed to fstat pid namespace fd, ignoring: %m");
else if ((uint64_t) st.st_ino != 0xEFFFFFFC) {
if (running_in_pidns() > 0) {
v = VIRTUALIZATION_CONTAINER_OTHER;
goto finish;
}
}
/* If none of that worked, give up, assume no container manager. */
v = VIRTUALIZATION_NONE;

View File

@ -4,6 +4,7 @@ set -e
TEST_DESCRIPTION="Tests for auxiliary utilities"
NSPAWN_ARGUMENTS="--private-network"
TEST_NO_NSPAWN=1
# shellcheck source=test/test-functions
. "${TEST_BASE_DIR:?}/test-functions"