append_syscall_to_bpf(): Explicit type cast to fix (C++) warnings
This commit is contained in:
джерело
55e1f42ca8
коміт
0d7c5bd6d4
2
qssb.h
2
qssb.h
@ -740,7 +740,7 @@ static void append_syscalls_to_bpf(long *syscalls, size_t n, unsigned int action
|
||||
long syscall = syscalls[i];
|
||||
if(syscall != QSSB_SYSCALL_MATCH_ALL)
|
||||
{
|
||||
struct sock_filter syscall_check = BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, syscall, 0, 1);
|
||||
struct sock_filter syscall_check = BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, (unsigned int) syscall, 0, 1);
|
||||
filter[(*start_index)++] = syscall_check;
|
||||
}
|
||||
struct sock_filter syscall_action = BPF_STMT(BPF_RET+BPF_K, action);
|
||||
|
Завантаження…
Посилання в новій задачі
Block a user