summaryrefslogtreecommitdiffstats
path: root/man/systemd-detect-virt.xml
diff options
context:
space:
mode:
authorChris Down <chris@chrisdown.name>2020-04-14 19:15:04 +0200
committerChris Down <chris@chrisdown.name>2020-04-15 19:36:35 +0200
commit80cc3e3eabd2cf4e31ae3f0d6e2ac7b61d0a1832 (patch)
tree4382f7656e7d6d5b2f894406291207ef0d938eb5 /man/systemd-detect-virt.xml
parentMerge pull request #15431 from poettering/lock-and-key-emoji (diff)
downloadsystemd-80cc3e3eabd2cf4e31ae3f0d6e2ac7b61d0a1832.tar.xz
systemd-80cc3e3eabd2cf4e31ae3f0d6e2ac7b61d0a1832.zip
virt: Detect proot virtualisation by ptrace metadata
proot provides userspace-powered emulation of chroot and mount --bind, lending it to be used on environments without unprivileged user namespaces, or in otherwise restricted environments like Android. In order to achieve this, proot makes use of the kernel's ptrace() facility, which we can use in order to detect its presence. Since it doesn't use any kind of namespacing, including PID namespacing, we don't need to do any tricks when trying to get the tracer's metadata. For our purposes, proot is listed as a "container", since we mostly use this also as the bucket for non-container-but-container-like technologies like WSL. As such, it seems like a good fit for this section as well.
Diffstat (limited to 'man/systemd-detect-virt.xml')
-rw-r--r--man/systemd-detect-virt.xml5
1 files changed, 5 insertions, 0 deletions
diff --git a/man/systemd-detect-virt.xml b/man/systemd-detect-virt.xml
index d599ac20f1..77bdd80f32 100644
--- a/man/systemd-detect-virt.xml
+++ b/man/systemd-detect-virt.xml
@@ -167,6 +167,11 @@
<entry><varname>wsl</varname></entry>
<entry><ulink url="https://docs.microsoft.com/en-us/windows/wsl/about">Windows Subsystem for Linux</ulink></entry>
</row>
+
+ <row>
+ <entry><varname>proot</varname></entry>
+ <entry><ulink url="https://proot-me.github.io/">proot</ulink> userspace chroot/bind mount emulation</entry>
+ </row>
</tbody>
</tgroup>
</table>