{
int ret;
char *buf = NULL;
- size_t buf_size;
+ long raw_get_pw_buf_size;
+ size_t get_pw_buf_size;
struct passwd pwd;
struct passwd *result = NULL;
/* Fetch the max size for the temporary buffer. */
errno = 0;
- buf_size = sysconf(_SC_GETPW_R_SIZE_MAX);
- if (buf_size < 0) {
+ raw_get_pw_buf_size = sysconf(_SC_GETPW_R_SIZE_MAX);
+ if (raw_get_pw_buf_size < 0) {
if (errno != 0) {
PERROR("Failed to query _SC_GETPW_R_SIZE_MAX");
goto error;
/* Limit is indeterminate. */
WARN("Failed to query _SC_GETPW_R_SIZE_MAX as it is "
"indeterminate; falling back to default buffer size");
- buf_size = GETPW_BUFFER_FALLBACK_SIZE;
+ raw_get_pw_buf_size = GETPW_BUFFER_FALLBACK_SIZE;
}
- buf = zmalloc(buf_size);
+ get_pw_buf_size = (size_t) raw_get_pw_buf_size;
+
+ buf = zmalloc(get_pw_buf_size);
if (buf == NULL) {
PERROR("Failed to allocate buffer to get password file entries");
goto error;
}
- ret = getpwuid_r(uid, &pwd, buf, buf_size, &result);
+ ret = getpwuid_r(uid, &pwd, buf, get_pw_buf_size, &result);
if (ret < 0) {
PERROR("Failed to get user information for user: uid = %d",
(int) uid);
ssize_t readlen, writelen;
struct run_as_ret sendret = {};
run_as_fct cmd;
- uid_t prev_ruid;
- gid_t prev_rgid;
+ const uid_t prev_ruid = getuid();
+ const gid_t prev_rgid = getgid();
/*
* Stage 1: Receive run_as_data struct from the master.
goto end;
}
- prev_ruid = getuid();
- prev_rgid = getgid();
-
ret = demote_creds(prev_ruid, prev_rgid, data.uid, data.gid);
if (ret < 0) {
goto write_return;