int status;
int ret = -1;
- if (getuid() == 0)
+ if (geteuid() == 0)
return 0;
cmd = virCommandNewArgList(POLKIT_AUTH, "--obtain", privilege, NULL);
{0, 0, 0, 0}
};
- privileged = getuid() == 0;
+ privileged = geteuid() == 0;
if (setlocale(LC_ALL, "") == NULL ||
bindtextdomain(PACKAGE, LOCALEDIR) == NULL ||
{
virNetClientPtr client;
- if (!(client = virLockManagerLockDaemonConnectionNew(getuid() == 0, program)))
+ if (!(client = virLockManagerLockDaemonConnectionNew(geteuid() == 0, program)))
return NULL;
if (virLockManagerLockDaemonConnectionRegister(lock,
memset(&args, 0, sizeof(args));
args.path = (char*)path;
- if (!(client = virLockManagerLockDaemonConnectionNew(getuid() == 0, &program)))
+ if (!(client = virLockManagerLockDaemonConnectionNew(geteuid() == 0, &program)))
return -1;
if (virNetClientProgramCall(program,
goto cleanup;
}
- if (getuid() != 0) {
+ if (geteuid() != 0) {
fprintf(stderr, "%s: must be run as the 'root' user\n", argv[0]);
goto cleanup;
}
unsigned int vfoflags = 0;
int fd = -1;
int path_shared = virStorageFileIsSharedFS(path);
- uid_t uid = getuid();
- gid_t gid = getgid();
+ uid_t uid = geteuid();
+ gid_t gid = getegid();
/* path might be a pre-existing block dev, in which case
* we need to skip the create step, and also avoid unlink
qemu user is non-root, just set a flag to
bypass security driver shenanigans, and retry the operation
after doing setuid to qemu user */
- if ((fd != -EACCES && fd != -EPERM) || fallback_uid == getuid())
+ if ((fd != -EACCES && fd != -EPERM) || fallback_uid == geteuid())
goto error;
/* On Linux we can also verify the FS-type of the directory. */
(strstr(conn->uri->scheme, "+unix") != NULL)) &&
(STREQ(conn->uri->path, "/session") ||
STRPREFIX(conn->uri->scheme, "test+")) &&
- getuid() > 0) {
+ geteuid() > 0) {
VIR_DEBUG("Auto-spawn user daemon instance");
rflags |= VIR_DRV_OPEN_REMOTE_USER;
if (!virIsSUID() &&
if (!conn->uri) {
VIR_DEBUG("Auto-probe remote URI");
#ifndef __sun
- if (getuid() > 0) {
+ if (geteuid() > 0) {
VIR_DEBUG("Auto-spawn user daemon instance");
rflags |= VIR_DRV_OPEN_REMOTE_USER;
if (!virIsSUID() &&
bool filecreated = false;
if ((pool->def->type == VIR_STORAGE_POOL_NETFS)
- && (((getuid() == 0)
+ && (((geteuid() == 0)
&& (vol->target.perms.uid != (uid_t) -1)
&& (vol->target.perms.uid != 0))
|| ((vol->target.perms.gid != (gid_t) -1)
- && (vol->target.perms.gid != getgid())))) {
+ && (vol->target.perms.gid != getegid())))) {
virCommandSetUID(cmd, vol->target.perms.uid);
virCommandSetGID(cmd, vol->target.perms.gid);
/* Reflect the actual uid and gid to the config. */
if (pool->def->target.perms.uid == (uid_t) -1)
- pool->def->target.perms.uid = getuid();
+ pool->def->target.perms.uid = geteuid();
if (pool->def->target.perms.gid == (gid_t) -1)
- pool->def->target.perms.gid = getgid();
+ pool->def->target.perms.gid = getegid();
if (flags != 0) {
ret = virStorageBackendMakeFileSystem(pool, flags);
goto error;
/* We can only chown/grp if root */
- if (getuid() == 0) {
+ if (geteuid() == 0) {
if (fchown(fd, vol->target.perms.uid, vol->target.perms.gid) < 0) {
virReportSystemError(errno,
_("cannot set file owner '%s'"),
gid_t *groups;
int ngroups;
- if (uid == getuid() &&
- gid == getgid())
+ if (uid == geteuid() &&
+ gid == getegid())
return access(path, mode);
ngroups = virGetGroupList(uid, gid, &groups);
/* allow using -1 to mean "current value" */
if (uid == (uid_t) -1)
- uid = getuid();
+ uid = geteuid();
if (gid == (gid_t) -1)
- gid = getgid();
+ gid = getegid();
/* treat absence of both flags as presence of both for simpler
* calling. */
flags |= VIR_FILE_OPEN_NOFORK|VIR_FILE_OPEN_FORK;
if ((flags & VIR_FILE_OPEN_NOFORK)
- || (getuid() != 0)
+ || (geteuid() != 0)
|| ((uid == 0) && (gid == 0))) {
if ((fd = open(path, openflags, mode)) < 0) {
/* allow using -1 to mean "current value" */
if (uid == (uid_t) -1)
- uid = getuid();
+ uid = geteuid();
if (gid == (gid_t) -1)
- gid = getgid();
+ gid = getegid();
if ((!(flags & VIR_DIR_CREATE_AS_UID))
- || (getuid() != 0)
+ || (geteuid() != 0)
|| ((uid == 0) && (gid == 0))
|| ((flags & VIR_DIR_CREATE_ALLOW_EXIST) && (stat(path, &st) >= 0))) {
return virDirCreateNoFork(path, mode, uid, gid, flags);
virAsprintf(&processtime, "%llu", timestamp) < 0)
goto cleanup;
- if (!(username = virGetUserName(getuid())))
+ if (!(username = virGetUserName(geteuid())))
goto cleanup;
- if (virAsprintf(&userid, "%d", (int)getuid()) < 0)
+ if (virAsprintf(&userid, "%d", (int)geteuid()) < 0)
goto cleanup;
- if (!(groupname = virGetGroupName(getgid())))
+ if (!(groupname = virGetGroupName(getegid())))
goto cleanup;
- if (virAsprintf(&groupid, "%d", (int)getgid()) < 0)
+ if (virAsprintf(&groupid, "%d", (int)getegid()) < 0)
goto cleanup;
#if WITH_SELINUX
goto cleanup;
}
- if (virFileAccessibleAs(combined, F_OK, getuid(), getgid()) < 0) {
+ if (virFileAccessibleAs(combined, F_OK, geteuid(), getegid()) < 0) {
virReportSystemError(errno,
_("Cannot access backing file '%s'"),
combined);
virConnectAuthPtr auth ATTRIBUTE_UNUSED,
unsigned int flags)
{
- uid_t uid = getuid();
+ uid_t uid = geteuid();
virCheckFlags(VIR_CONNECT_RO, VIR_DRV_OPEN_ERROR);
unsigned int flags)
{
vboxGlobalData *data = NULL;
- uid_t uid = getuid();
+ uid_t uid = geteuid();
virCheckFlags(VIR_CONNECT_RO, VIR_DRV_OPEN_ERROR);
goto error;
}
- if (virNetSocketNewListenUNIX(path, 0700, getuid(), getgid(),
+ if (virNetSocketNewListenUNIX(path, 0700, geteuid(), getegid(),
&test->server) < 0)
goto error;
if (virAsprintf(&path, "%s/test.sock", tmpdir) < 0)
goto cleanup;
- if (virNetSocketNewListenUNIX(path, 0700, -1, getgid(), &lsock) < 0)
+ if (virNetSocketNewListenUNIX(path, 0700, -1, getegid(), &lsock) < 0)
goto cleanup;
if (virNetSocketListen(lsock, 0) < 0)
if (virAsprintf(&path, "%s/test.sock", tmpdir) < 0)
goto cleanup;
- if (virNetSocketNewListenUNIX(path, 0700, -1, getgid(), &lsock) < 0)
+ if (virNetSocketNewListenUNIX(path, 0700, -1, getegid(), &lsock) < 0)
goto cleanup;
if (STRNEQ(virNetSocketLocalAddrString(lsock), "127.0.0.1;0")) {