summaryrefslogtreecommitdiffhomepage
path: root/pkg/seccomp
diff options
context:
space:
mode:
authorgVisor bot <gvisor-bot@google.com>2020-06-18 16:07:05 +0000
committergVisor bot <gvisor-bot@google.com>2020-06-18 16:07:05 +0000
commit9de68043457262a32956e7f51ebc4a5f2c0f5c8b (patch)
treeef623d89ec7fd80cf2c35c53b47868ad1b5cac39 /pkg/seccomp
parent356e6b7c281e4da83b1b2e0316b3131f2833ed19 (diff)
parent3970c127434817304f67a2ad192cbe8094ad3353 (diff)
Merge release-20200608.0-83-g3970c1274 (automated)
Diffstat (limited to 'pkg/seccomp')
-rw-r--r--pkg/seccomp/seccomp_rules.go4
1 files changed, 2 insertions, 2 deletions
diff --git a/pkg/seccomp/seccomp_rules.go b/pkg/seccomp/seccomp_rules.go
index 06308cd29..a52dc1b4e 100644
--- a/pkg/seccomp/seccomp_rules.go
+++ b/pkg/seccomp/seccomp_rules.go
@@ -56,7 +56,7 @@ func (a AllowValue) String() (s string) {
return fmt.Sprintf("%#x ", uintptr(a))
}
-// Rule stores the whitelist of syscall arguments.
+// Rule stores the allowed syscall arguments.
//
// For example:
// rule := Rule {
@@ -82,7 +82,7 @@ func (r Rule) String() (s string) {
return
}
-// SyscallRules stores a map of OR'ed whitelist rules indexed by the syscall number.
+// SyscallRules stores a map of OR'ed argument rules indexed by the syscall number.
// If the 'Rules' is empty, we treat it as any argument is allowed.
//
// For example: