/* On BSD systems the effective gid is the first group in the list. */
egid = runas_gr ? (unsigned int)runas_gr->gr_gid :
(unsigned int)runas_pw->pw_gid;
- len = snprintf(cp, glsize - (cp - gid_list), "%u", egid);
+ len = snprintf(cp, glsize - (cp - gid_list), "%u", (unsigned int)egid);
if (len < 0 || (size_t)len >= glsize - (cp - gid_list)) {
sudo_warnx(U_("internal error, %s overflow"), __func__);
free(gid_list);
if (!ISSET(key->flags, TS_ANYUID) && entry->auth_uid != key->auth_uid) {
sudo_debug_printf(SUDO_DEBUG_DEBUG,
"%s:%u record uid mismatch (want %u, got %u)", __func__, recno,
- key->auth_uid, entry->auth_uid);
+ (unsigned int)key->auth_uid, (unsigned int)entry->auth_uid);
debug_return_bool(false);
}
if (entry->type != key->type) {
} else {
if (chown(sp->tpath, sudoers_uid, sudoers_gid) != 0) {
sudo_warn(U_("unable to set (uid, gid) of %s to (%u, %u)"),
- sp->tpath, sudoers_uid, sudoers_gid);
+ sp->tpath, (unsigned int)sudoers_uid,
+ (unsigned int)sudoers_gid);
goto done;
}
if (chmod(sp->tpath, sudoers_mode) != 0) {
if (!quiet) {
fprintf(stderr,
_("%s: wrong owner (uid, gid) should be (%u, %u)\n"),
- path, sudoers_uid, sudoers_gid);
+ path, (unsigned int)sudoers_uid, (unsigned int)sudoers_gid);
}
}
if ((sb.st_mode & ALLPERMS) != sudoers_mode) {
debug_decl(switch_user, SUDO_DEBUG_EDIT)
sudo_debug_printf(SUDO_DEBUG_INFO|SUDO_DEBUG_LINENO,
- "set uid:gid to %u:%u(%u)", euid, egid, ngroups ? groups[0] : egid);
+ "set uid:gid to %u:%u(%u)", (unsigned int)euid, (unsigned int)egid,
+ ngroups ? (unsigned int)groups[0] : (unsigned int)egid);
/* When restoring root, change euid first; otherwise change it last. */
if (euid == ROOT_UID) {
}
if (euid != ROOT_UID) {
if (seteuid(euid) != 0)
- sudo_fatal("seteuid(%d)", (int)euid);
+ sudo_fatal("seteuid(%u)", (unsigned int)euid);
}
errno = serrno;
tf[j].osize = sb.st_size;
mtim_get(&sb, tf[j].omtim);
sudo_debug_printf(SUDO_DEBUG_INFO|SUDO_DEBUG_LINENO,
- "seteuid(%u)", user_details.uid);
+ "seteuid(%u)", (unsigned int)user_details.uid);
if (seteuid(user_details.uid) != 0)
- sudo_fatal("seteuid(%d)", (int)user_details.uid);
+ sudo_fatal("seteuid(%u)", (unsigned int)user_details.uid);
tfd = sudo_edit_mktemp(tf[j].ofile, &tf[j].tfile);
sudo_debug_printf(SUDO_DEBUG_INFO|SUDO_DEBUG_LINENO,
"seteuid(%u)", ROOT_UID);
for (i = 0; i < nfiles; i++) {
rc = -1;
sudo_debug_printf(SUDO_DEBUG_INFO|SUDO_DEBUG_LINENO,
- "seteuid(%u)", user_details.uid);
+ "seteuid(%u)", (unsigned int)user_details.uid);
if (seteuid(user_details.uid) != 0)
- sudo_fatal("seteuid(%d)", (int)user_details.uid);
+ sudo_fatal("seteuid(%u)", (unsigned int)user_details.uid);
tfd = sudo_edit_open(tf[i].tfile, O_RDONLY,
S_IRUSR|S_IWUSR|S_IRGRP|S_IROTH, NULL);
if (tfd != -1)