diff options
author | Michael Pratt <mpratt@google.com> | 2020-06-18 09:02:14 -0700 |
---|---|---|
committer | gVisor bot <gvisor-bot@google.com> | 2020-06-18 09:03:39 -0700 |
commit | 3970c127434817304f67a2ad192cbe8094ad3353 (patch) | |
tree | 4552afc303c62603662edce735a3b31eae260a3d /pkg/seccomp | |
parent | 07ff909e76d8233827e705476ec116fc2cecec2f (diff) |
Remove various uses of 'whitelist'
Updates #2972
PiperOrigin-RevId: 317113059
Diffstat (limited to 'pkg/seccomp')
-rw-r--r-- | pkg/seccomp/seccomp_rules.go | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/pkg/seccomp/seccomp_rules.go b/pkg/seccomp/seccomp_rules.go index 06308cd29..a52dc1b4e 100644 --- a/pkg/seccomp/seccomp_rules.go +++ b/pkg/seccomp/seccomp_rules.go @@ -56,7 +56,7 @@ func (a AllowValue) String() (s string) { return fmt.Sprintf("%#x ", uintptr(a)) } -// Rule stores the whitelist of syscall arguments. +// Rule stores the allowed syscall arguments. // // For example: // rule := Rule { @@ -82,7 +82,7 @@ func (r Rule) String() (s string) { return } -// SyscallRules stores a map of OR'ed whitelist rules indexed by the syscall number. +// SyscallRules stores a map of OR'ed argument rules indexed by the syscall number. // If the 'Rules' is empty, we treat it as any argument is allowed. // // For example: |