| Index: sandbox/linux/seccomp-bpf/verifier.cc
|
| diff --git a/sandbox/linux/seccomp-bpf/verifier.cc b/sandbox/linux/seccomp-bpf/verifier.cc
|
| index 3d100e61d72666e0034c5f12a66cd74bec00effe..352b36fbaa3c5ff66f204bc3c9547632f09afa8e 100644
|
| --- a/sandbox/linux/seccomp-bpf/verifier.cc
|
| +++ b/sandbox/linux/seccomp-bpf/verifier.cc
|
| @@ -17,7 +17,7 @@ bool Verifier::verifyBPF(const std::vector<struct sock_filter>& program,
|
| return false;
|
| }
|
| Sandbox::EvaluateSyscall evaluateSyscall = evaluators.begin()->first;
|
| - for (int nr = MIN_SYSCALL-1; nr <= MAX_SYSCALL+1; ++nr) {
|
| + for (int nr = MIN_SYSCALL-1; nr <= static_cast<int>(MAX_SYSCALL)+1; ++nr) {
|
| // We ideally want to iterate over the full system call range and values
|
| // just above and just below this range. This gives us the full result set
|
| // of the "evaluators".
|
| @@ -167,7 +167,7 @@ void Verifier::jmp(State *state, const struct sock_filter& insn,
|
| }
|
| }
|
|
|
| -uint32_t Verifier::ret(State *state, const struct sock_filter& insn,
|
| +uint32_t Verifier::ret(State *, const struct sock_filter& insn,
|
| const char **err) {
|
| if (BPF_SRC(insn.code) != BPF_K) {
|
| *err = "Invalid BPF_RET instruction";
|
|
|