log_error(NO_EXIT, "%s exists but is not a directory (0%o)",
dirparent, sb.st_mode);
else if (sb.st_uid != timestamp_uid)
- log_error(NO_EXIT, "%s owned by uid %ld, should be uid %ld",
- dirparent, (long) sb.st_uid, (long) timestamp_uid);
+ log_error(NO_EXIT, "%s owned by uid %lu, should be uid %lu",
+ dirparent, (unsigned long) sb.st_uid,
+ (unsigned long) timestamp_uid);
else if ((sb.st_mode & 0000022))
log_error(NO_EXIT,
"%s writable by non-owner (0%o), should be mode 0700",
log_error(NO_EXIT, "%s exists but is not a directory (0%o)",
timestampdir, sb.st_mode);
} else if (sb.st_uid != timestamp_uid)
- log_error(NO_EXIT, "%s owned by uid %ld, should be uid %ld",
- timestampdir, (long) sb.st_uid, (long) timestamp_uid);
+ log_error(NO_EXIT, "%s owned by uid %lu, should be uid %lu",
+ timestampdir, (unsigned long) sb.st_uid,
+ (unsigned long) timestamp_uid);
else if ((sb.st_mode & 0000022))
log_error(NO_EXIT,
"%s writable by non-owner (0%o), should be mode 0700",
/* If bad uid or file mode, complain and kill the bogus file. */
if (sb.st_uid != timestamp_uid) {
log_error(NO_EXIT,
- "%s owned by uid %ld, should be uid %ld",
- timestampfile, (long) sb.st_uid, (long) timestamp_uid);
+ "%s owned by uid %ud, should be uid %lu",
+ timestampfile, (unsigned long) sb.st_uid,
+ (unsigned long) timestamp_uid);
(void) unlink(timestampfile);
} else if ((sb.st_mode & 0000022)) {
log_error(NO_EXIT,
/* Add the SUDO_USER, SUDO_UID, SUDO_GID environment variables. */
insert_env(format_env("SUDO_USER", user_name), 1);
- easprintf(&cp, "SUDO_UID=%ld", (long) user_uid);
+ easprintf(&cp, "SUDO_UID=%lu", (unsigned long) user_uid);
insert_env(cp, 1);
- easprintf(&cp, "SUDO_GID=%ld", (long) user_gid);
+ easprintf(&cp, "SUDO_GID=%lu", (unsigned long) user_gid);
insert_env(cp, 1);
return(new_environ);
pw.pw_name = pw_name;
sudo_user.pw = &pw;
- log_error(0, "uid %ld does not exist in the passwd file!",
- (long) pw.pw_uid);
+ log_error(0, "uid %lu does not exist in the passwd file!",
+ (unsigned long) pw.pw_uid);
}
if (user_shell == NULL || *user_shell == '\0')
user_shell = sudo_user.pw->pw_shell;
log_error(0, "%s is mode 0%o, should be 0%o", _PATH_SUDOERS,
(statbuf.st_mode & 07777), SUDOERS_MODE);
else if (statbuf.st_uid != SUDOERS_UID)
- log_error(0, "%s is owned by uid %ld, should be %d", _PATH_SUDOERS,
- (long) statbuf.st_uid, SUDOERS_UID);
+ log_error(0, "%s is owned by uid %lu, should be %lu", _PATH_SUDOERS,
+ (unsigned long) statbuf.st_uid, SUDOERS_UID);
else if (statbuf.st_gid != SUDOERS_GID)
- log_error(0, "%s is owned by gid %ld, should be %d", _PATH_SUDOERS,
- (long) statbuf.st_gid, SUDOERS_GID);
+ log_error(0, "%s is owned by gid %lu, should be %lu", _PATH_SUDOERS,
+ (unsigned long) statbuf.st_gid, SUDOERS_GID);
else {
/* Solaris sometimes returns EAGAIN so try 10 times */
for (i = 0; i < 10 ; i++) {