diff --git a/zathura/seccomp-filters.c b/zathura/seccomp-filters.c index 044ac1c..96d5a01 100644 --- a/zathura/seccomp-filters.c +++ b/zathura/seccomp-filters.c @@ -225,7 +225,7 @@ seccomp_enable_strict_filter(bool test) ADD_RULE("errno", SCMP_ACT_ERRNO(EPERM), sched_getattr, 0); /* check test flag, allow additional syscalls for test mode */ - if (test){ + if (test) { ALLOW_RULE(timer_create); ALLOW_RULE(timer_delete); } diff --git a/zathura/zathura.c b/zathura/zathura.c index 0df1d69..39fddb2 100644 --- a/zathura/zathura.c +++ b/zathura/zathura.c @@ -448,7 +448,7 @@ zathura_init(zathura_t* zathura) break; case ZATHURA_SANDBOX_STRICT: girara_debug("Strict sandbox preventing write and network access."); - if (seccomp_enable_strict_filter(0) != 0) { + if (seccomp_enable_strict_filter(false) != 0) { girara_error("Failed to initialize strict seccomp filter."); goto error_free; } @@ -457,7 +457,7 @@ zathura_init(zathura_t* zathura) break; case ZATHURA_SANDBOX_TEST: girara_debug("Strict sandbox preventing write and network access, testmode."); - if (seccomp_enable_strict_filter(1) != 0) { + if (seccomp_enable_strict_filter(true) != 0) { girara_error("Failed to initialize test seccomp filter."); goto error_free; }