Fix:
seccomp_bpf.c: In function ‘UPROBE_setup’:
seccomp_bpf.c:5175:74: error: pointer type mismatch in conditional expression
by type casting the argument to get_uprobe_offset().
Fixes: 9ffc7a635c35a ("selftests/seccomp: validate uprobe syscall passes
through seccomp")
Cc: Jiri Olsa <[email protected]>
Cc: Peter Zijlstra (Intel) <[email protected]>
Signed-off-by: Guenter Roeck <[email protected]>
---
tools/testing/selftests/seccomp/seccomp_bpf.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/tools/testing/selftests/seccomp/seccomp_bpf.c
b/tools/testing/selftests/seccomp/seccomp_bpf.c
index 874f17763536..2584f4f5c062 100644
--- a/tools/testing/selftests/seccomp/seccomp_bpf.c
+++ b/tools/testing/selftests/seccomp/seccomp_bpf.c
@@ -5172,7 +5172,8 @@ FIXTURE_SETUP(UPROBE)
ASSERT_GE(bit, 0);
}
- offset = get_uprobe_offset(variant->uretprobe ? probed_uretprobe :
probed_uprobe);
+ offset = get_uprobe_offset(variant->uretprobe ?
+ (void *)probed_uretprobe : (void
*)probed_uprobe);
ASSERT_GE(offset, 0);
if (variant->uretprobe)
--
2.43.0