logswan

Fast Web log analyzer using probabilistic data structures
Log | Files | Refs | README | LICENSE

commit e8e598c1e251851a4c52cc3b037772deb58daf08
parent 2f92e72b489b939a5b4a5e8ff2c30abda64892ac
Author: Frederic Cambus <fred@statdns.com>
Date:   Tue, 23 Jun 2020 22:09:42 +0200

Minor code shuffling, for consistency with other codebases.

Diffstat:
Msrc/seccomp.h | 10+++++-----
1 file changed, 5 insertions(+), 5 deletions(-)

diff --git a/src/seccomp.h b/src/seccomp.h @@ -4,7 +4,7 @@ * https://www.logswan.org * * Created: 2015-05-31 - * Last Updated: 2019-10-26 + * Last Updated: 2020-06-23 * * Logswan is released under the BSD 2-Clause license. * See LICENSE file for details. @@ -21,10 +21,6 @@ #include <linux/filter.h> #include <linux/seccomp.h> -#define LOGSWAN_SYSCALL_ALLOW(syscall) \ - BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, __NR_##syscall, 0, 1), \ - BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW) - #if defined(__x86_64__) #define SECCOMP_AUDIT_ARCH AUDIT_ARCH_X86_64 #elif defined(__aarch64__) @@ -33,6 +29,10 @@ #error "Seccomp is only supported on amd64 and aarch64 architectures." #endif +#define LOGSWAN_SYSCALL_ALLOW(syscall) \ + BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, __NR_##syscall, 0, 1), \ + BPF_STMT(BPF_RET+BPF_K, SECCOMP_RET_ALLOW) + static struct sock_filter filter[] = { /* Validate architecture */ BPF_STMT(BPF_LD+BPF_W+BPF_ABS, offsetof(struct seccomp_data, arch)),