summaryrefslogtreecommitdiffhomepage
path: root/pkg/seccomp
diff options
context:
space:
mode:
authorMichael Pratt <mpratt@google.com>2020-06-18 09:02:14 -0700
committergVisor bot <gvisor-bot@google.com>2020-06-18 09:03:39 -0700
commit3970c127434817304f67a2ad192cbe8094ad3353 (patch)
tree4552afc303c62603662edce735a3b31eae260a3d /pkg/seccomp
parent07ff909e76d8233827e705476ec116fc2cecec2f (diff)
Remove various uses of 'whitelist'
Updates #2972 PiperOrigin-RevId: 317113059
Diffstat (limited to 'pkg/seccomp')
-rw-r--r--pkg/seccomp/seccomp_rules.go4
1 files changed, 2 insertions, 2 deletions
diff --git a/pkg/seccomp/seccomp_rules.go b/pkg/seccomp/seccomp_rules.go
index 06308cd29..a52dc1b4e 100644
--- a/pkg/seccomp/seccomp_rules.go
+++ b/pkg/seccomp/seccomp_rules.go
@@ -56,7 +56,7 @@ func (a AllowValue) String() (s string) {
return fmt.Sprintf("%#x ", uintptr(a))
}
-// Rule stores the whitelist of syscall arguments.
+// Rule stores the allowed syscall arguments.
//
// For example:
// rule := Rule {
@@ -82,7 +82,7 @@ func (r Rule) String() (s string) {
return
}
-// SyscallRules stores a map of OR'ed whitelist rules indexed by the syscall number.
+// SyscallRules stores a map of OR'ed argument rules indexed by the syscall number.
// If the 'Rules' is empty, we treat it as any argument is allowed.
//
// For example: