1SYSTEMD-DETECT-VIRT(1) systemd-detect-virt SYSTEMD-DETECT-VIRT(1)
2
3
4
6 systemd-detect-virt - Detect execution in a virtualized environment
7
9 systemd-detect-virt [OPTIONS...]
10
12 systemd-detect-virt detects execution in a virtualized environment. It
13 identifies the virtualization technology and can distinguish full
14 machine virtualization from container virtualization.
15 systemd-detect-virt exits with a return value of 0 (success) if a
16 virtualization technology is detected, and non-zero (error) otherwise.
17 By default, any type of virtualization is detected, and the options
18 --container and --vm can be used to limit what types of virtualization
19 are detected.
20
21 When executed without --quiet will print a short identifier for the
22 detected virtualization technology. The following technologies are
23 currently identified:
24
25 Table 1. Known virtualization technologies (both VM, i.e. full hardware
26 virtualization, and container, i.e. shared kernel virtualization)
27 ┌──────────┬────────────────────┬─────────────────────┐
28 │Type │ ID │ Product │
29 ├──────────┼────────────────────┼─────────────────────┤
30 │VM │ qemu │ QEMU software │
31 │ │ │ virtualization, │
32 │ │ │ without KVM │
33 │ ├────────────────────┼─────────────────────┤
34 │ │ kvm │ Linux KVM kernel │
35 │ │ │ virtual machine, in │
36 │ │ │ combination with │
37 │ │ │ QEMU. Not used for │
38 │ │ │ other virtualizers │
39 │ │ │ using the KVM │
40 │ │ │ interfaces, such as │
41 │ │ │ Oracle VirtualBox │
42 │ │ │ or Amazon EC2 │
43 │ │ │ Nitro, see below. │
44 │ ├────────────────────┼─────────────────────┤
45 │ │ amazon │ Amazon EC2 Nitro │
46 │ │ │ using Linux KVM │
47 │ ├────────────────────┼─────────────────────┤
48 │ │ zvm │ s390 z/VM │
49 │ ├────────────────────┼─────────────────────┤
50 │ │ vmware │ VMware Workstation │
51 │ │ │ or Server, and │
52 │ │ │ related products │
53 │ ├────────────────────┼─────────────────────┤
54 │ │ microsoft │ Hyper-V, also known │
55 │ │ │ as Viridian or │
56 │ │ │ Windows Server │
57 │ │ │ Virtualization │
58 │ ├────────────────────┼─────────────────────┤
59 │ │ oracle │ Oracle VM │
60 │ │ │ VirtualBox │
61 │ │ │ (historically │
62 │ │ │ marketed by innotek │
63 │ │ │ and Sun │
64 │ │ │ Microsystems), for │
65 │ │ │ legacy and KVM │
66 │ │ │ hypervisor │
67 │ ├────────────────────┼─────────────────────┤
68 │ │ powervm │ IBM PowerVM │
69 │ │ │ hypervisor — comes │
70 │ │ │ as firmware with │
71 │ │ │ some IBM POWER │
72 │ │ │ servers │
73 │ ├────────────────────┼─────────────────────┤
74 │ │ xen │ Xen hypervisor │
75 │ │ │ (only domU, not │
76 │ │ │ dom0) │
77 │ ├────────────────────┼─────────────────────┤
78 │ │ bochs │ Bochs Emulator │
79 │ ├────────────────────┼─────────────────────┤
80 │ │ uml │ User-mode Linux │
81 │ ├────────────────────┼─────────────────────┤
82 │ │ parallels │ Parallels Desktop, │
83 │ │ │ Parallels Server │
84 │ ├────────────────────┼─────────────────────┤
85 │ │ bhyve │ bhyve, FreeBSD │
86 │ │ │ hypervisor │
87 │ ├────────────────────┼─────────────────────┤
88 │ │ qnx │ QNX hypervisor │
89 ├──────────┼────────────────────┼─────────────────────┤
90 │acrn │ ACRN hypervisor[1] │ │
91 ├──────────┼────────────────────┼─────────────────────┤
92 │Container │ openvz │ OpenVZ/Virtuozzo │
93 │ ├────────────────────┼─────────────────────┤
94 │ │ lxc │ Linux container │
95 │ │ │ implementation by │
96 │ │ │ LXC │
97 │ ├────────────────────┼─────────────────────┤
98 │ │ lxc-libvirt │ Linux container │
99 │ │ │ implementation by │
100 │ │ │ libvirt │
101 │ ├────────────────────┼─────────────────────┤
102 │ │ systemd-nspawn │ systemd's minimal │
103 │ │ │ container │
104 │ │ │ implementation, see │
105 │ │ │ systemd-nspawn(1) │
106 │ ├────────────────────┼─────────────────────┤
107 │ │ docker │ Docker container │
108 │ │ │ manager │
109 │ ├────────────────────┼─────────────────────┤
110 │ │ podman │ Podman[2] container │
111 │ │ │ manager │
112 │ ├────────────────────┼─────────────────────┤
113 │ │ rkt │ rkt app container │
114 │ │ │ runtime │
115 │ ├────────────────────┼─────────────────────┤
116 │ │ wsl │ Windows Subsystem │
117 │ │ │ for Linux[3] │
118 │ ├────────────────────┼─────────────────────┤
119 │ │ proot │ proot[4] userspace │
120 │ │ │ chroot/bind mount │
121 │ │ │ emulation │
122 │ ├────────────────────┼─────────────────────┤
123 │ │ pouch │ Pouch[5] Container │
124 │ │ │ Engine │
125 └──────────┴────────────────────┴─────────────────────┘
126
127 If multiple virtualization solutions are used, only the "innermost" is
128 detected and identified. That means if both machine and container
129 virtualization are used in conjunction, only the latter will be
130 identified (unless --vm is passed).
131
132 Windows Subsystem for Linux is not a Linux container, but an
133 environment for running Linux userspace applications on top of the
134 Windows kernel using a Linux-compatible interface. WSL is categorized
135 as a container for practical purposes. Multiple WSL environments share
136 the same kernel and services should generally behave like when being
137 run in a container.
138
140 The following options are understood:
141
142 -c, --container
143 Only detects container virtualization (i.e. shared kernel
144 virtualization).
145
146 -v, --vm
147 Only detects hardware virtualization.
148
149 -r, --chroot
150 Detect whether invoked in a chroot(2) environment. In this mode, no
151 output is written, but the return value indicates whether the
152 process was invoked in a chroot() environment or not.
153
154 --private-users
155 Detect whether invoked in a user namespace. In this mode, no output
156 is written, but the return value indicates whether the process was
157 invoked inside of a user namespace or not. See user_namespaces(7)
158 for more information.
159
160 -q, --quiet
161 Suppress output of the virtualization technology identifier.
162
163 --list
164 Output all currently known and detectable container and VM
165 environments.
166
167 -h, --help
168 Print a short help text and exit.
169
170 --version
171 Print a short version string and exit.
172
174 If a virtualization technology is detected, 0 is returned, a non-zero
175 code otherwise.
176
178 systemd(1), systemd-nspawn(1), chroot(2), namespaces(7)
179
181 1. ACRN hypervisor
182 https://projectacrn.org
183
184 2. Podman
185 https://podman.io
186
187 3. Windows Subsystem for Linux
188 https://docs.microsoft.com/en-us/windows/wsl/about
189
190 4. proot
191 https://proot-me.github.io/
192
193 5. Pouch
194 https://github.com/alibaba/pouch
195
196
197
198systemd 250 SYSTEMD-DETECT-VIRT(1)