diff options
author | gVisor bot <gvisor-bot@google.com> | 2020-06-18 16:07:05 +0000 |
---|---|---|
committer | gVisor bot <gvisor-bot@google.com> | 2020-06-18 16:07:05 +0000 |
commit | 9de68043457262a32956e7f51ebc4a5f2c0f5c8b (patch) | |
tree | ef623d89ec7fd80cf2c35c53b47868ad1b5cac39 /pkg/seccomp | |
parent | 356e6b7c281e4da83b1b2e0316b3131f2833ed19 (diff) | |
parent | 3970c127434817304f67a2ad192cbe8094ad3353 (diff) |
Merge release-20200608.0-83-g3970c1274 (automated)
Diffstat (limited to 'pkg/seccomp')
-rw-r--r-- | pkg/seccomp/seccomp_rules.go | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/pkg/seccomp/seccomp_rules.go b/pkg/seccomp/seccomp_rules.go index 06308cd29..a52dc1b4e 100644 --- a/pkg/seccomp/seccomp_rules.go +++ b/pkg/seccomp/seccomp_rules.go @@ -56,7 +56,7 @@ func (a AllowValue) String() (s string) { return fmt.Sprintf("%#x ", uintptr(a)) } -// Rule stores the whitelist of syscall arguments. +// Rule stores the allowed syscall arguments. // // For example: // rule := Rule { @@ -82,7 +82,7 @@ func (r Rule) String() (s string) { return } -// SyscallRules stores a map of OR'ed whitelist rules indexed by the syscall number. +// SyscallRules stores a map of OR'ed argument rules indexed by the syscall number. // If the 'Rules' is empty, we treat it as any argument is allowed. // // For example: |