Skip to content

Commit 7b93bf4

Browse files
authored
Replace problematic terms with alternatives that are appropriate to the particular project and context. (#569)
1 parent dc443d5 commit 7b93bf4

File tree

4 files changed

+4
-4
lines changed

4 files changed

+4
-4
lines changed

CHANGELOG.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -406,7 +406,7 @@
406406
## 0.4 - 2016-02-07
407407
### Changed
408408
- The daemon is now capable of dropping process capabilities and uses a seccomp
409-
based syscall whitelist. Options to enable these features were added to the
409+
based syscall allowlist. Options to enable these features were added to the
410410
usbguard-daemon command.
411411
- Devices connected at the start of the daemon are now recognized and the
412412
DevicePresent signal is sent for each of them.

README.adoc

+1-1
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ If you are compiling sources from a release tarball, you'll need the development
4747

4848
Optionally, you may want to install:
4949

50-
* https://github.com/seccomp/libseccomp[libseccomp] - used to implement a syscall whitelist
50+
* https://github.com/seccomp/libseccomp[libseccomp] - used to implement a syscall allowlist
5151
* https://people.redhat.com/sgrubb/libcap-ng/[libcap-ng] - used to drop process capabilities
5252

5353
If you are on a Debian based GNU/Linux distribution like Ubuntu 21.10,

doc/man/usbguard-daemon.8.adoc

+1-1
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ The policy and the authorization state of USB devices can be modified during run
5050
Drop capabilities to limit privileges of the process.
5151

5252
*-W*::
53-
Use a seccomp whitelist to limit available syscalls to the process.
53+
Use a seccomp allowlist to limit available syscalls to the process.
5454

5555
*-h*::
5656
Show the help/usage screen.

src/Daemon/Daemon.cpp

+1-1
Original file line numberDiff line numberDiff line change
@@ -578,7 +578,7 @@ namespace usbguard
578578
break;
579579

580580
case SIGSYS:
581-
USBGUARD_LOG(Error) << "Received SIGSYS: Seccomp whitelist violation!";
581+
USBGUARD_LOG(Error) << "Received SIGSYS: Seccomp allowlist violation!";
582582
exit_loop = false;
583583
break;
584584

0 commit comments

Comments
 (0)