diff options
Diffstat (limited to 'libc/seccomp/seccomp_policy.cpp')
-rw-r--r-- | libc/seccomp/seccomp_policy.cpp | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/libc/seccomp/seccomp_policy.cpp b/libc/seccomp/seccomp_policy.cpp index a42816eb6..65357fc3a 100644 --- a/libc/seccomp/seccomp_policy.cpp +++ b/libc/seccomp/seccomp_policy.cpp @@ -140,12 +140,12 @@ static void ValidateSyscallArgInRange(filter& f, __u32 arg_num, __u32 range_min, Disallow(f); } -// This filter is meant to be installed in addition to a regular allowlist filter. +// This filter is meant to be installed in addition to a regular whitelist filter. // Therefore, it's default action has to be Allow, except when the evaluated // system call matches setresuid/setresgid and the arguments don't fall within the // passed in range. // -// The regular allowlist only allows setresuid/setresgid for UID/GID changes, so +// The regular whitelist only allows setresuid/setresgid for UID/GID changes, so // that's the only system call we need to check here. A CTS test ensures the other // calls will remain blocked. static void ValidateSetUidGid(filter& f, uint32_t uid_gid_min, uint32_t uid_gid_max, bool primary) { |