append_syscall_to_bpf(): Explicit type cast to fix (C++) warnings

This commit is contained in:
Albert S. 2021-10-25 18:18:01 +02:00
parent 55e1f42ca8
commit 0d7c5bd6d4

2
qssb.h
View File

@ -740,7 +740,7 @@ static void append_syscalls_to_bpf(long *syscalls, size_t n, unsigned int action
long syscall = syscalls[i]; long syscall = syscalls[i];
if(syscall != QSSB_SYSCALL_MATCH_ALL) if(syscall != QSSB_SYSCALL_MATCH_ALL)
{ {
struct sock_filter syscall_check = BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, syscall, 0, 1); struct sock_filter syscall_check = BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, (unsigned int) syscall, 0, 1);
filter[(*start_index)++] = syscall_check; filter[(*start_index)++] = syscall_check;
} }
struct sock_filter syscall_action = BPF_STMT(BPF_RET+BPF_K, action); struct sock_filter syscall_action = BPF_STMT(BPF_RET+BPF_K, action);