Fix:

seccomp_bpf.c: In function ‘UPROBE_setup’:
seccomp_bpf.c:5175:74: error: pointer type mismatch in conditional expression

by type casting the argument to get_uprobe_offset().

Fixes: 9ffc7a635c35a ("selftests/seccomp: validate uprobe syscall passes 
through seccomp")
Cc: Jiri Olsa <[email protected]>
Cc: Peter Zijlstra (Intel) <[email protected]>
Signed-off-by: Guenter Roeck <[email protected]>
---
 tools/testing/selftests/seccomp/seccomp_bpf.c | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/tools/testing/selftests/seccomp/seccomp_bpf.c 
b/tools/testing/selftests/seccomp/seccomp_bpf.c
index 874f17763536..2584f4f5c062 100644
--- a/tools/testing/selftests/seccomp/seccomp_bpf.c
+++ b/tools/testing/selftests/seccomp/seccomp_bpf.c
@@ -5172,7 +5172,8 @@ FIXTURE_SETUP(UPROBE)
                ASSERT_GE(bit, 0);
        }
 
-       offset = get_uprobe_offset(variant->uretprobe ? probed_uretprobe : 
probed_uprobe);
+       offset = get_uprobe_offset(variant->uretprobe ?
+                                  (void *)probed_uretprobe : (void 
*)probed_uprobe);
        ASSERT_GE(offset, 0);
 
        if (variant->uretprobe)
-- 
2.43.0


Reply via email to