Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Replace problematic terms with alternatives #569

Merged
merged 1 commit into from
Nov 30, 2022
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -406,7 +406,7 @@
## 0.4 - 2016-02-07
### Changed
- The daemon is now capable of dropping process capabilities and uses a seccomp
based syscall whitelist. Options to enable these features were added to the
based syscall allowlist. Options to enable these features were added to the
usbguard-daemon command.
- Devices connected at the start of the daemon are now recognized and the
DevicePresent signal is sent for each of them.
Expand Down
2 changes: 1 addition & 1 deletion README.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -47,7 +47,7 @@ If you are compiling sources from a release tarball, you'll need the development

Optionally, you may want to install:

* https://github.com/seccomp/libseccomp[libseccomp] - used to implement a syscall whitelist
* https://github.com/seccomp/libseccomp[libseccomp] - used to implement a syscall allowlist
* https://people.redhat.com/sgrubb/libcap-ng/[libcap-ng] - used to drop process capabilities

If you are on a Debian based GNU/Linux distribution like Ubuntu 21.10,
Expand Down
2 changes: 1 addition & 1 deletion doc/man/usbguard-daemon.8.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@ The policy and the authorization state of USB devices can be modified during run
Drop capabilities to limit privileges of the process.

*-W*::
Use a seccomp whitelist to limit available syscalls to the process.
Use a seccomp allowlist to limit available syscalls to the process.

*-h*::
Show the help/usage screen.
Expand Down
2 changes: 1 addition & 1 deletion src/Daemon/Daemon.cpp
Original file line number Diff line number Diff line change
Expand Up @@ -577,7 +577,7 @@ namespace usbguard
break;

case SIGSYS:
USBGUARD_LOG(Error) << "Received SIGSYS: Seccomp whitelist violation!";
USBGUARD_LOG(Error) << "Received SIGSYS: Seccomp allowlist violation!";
exit_loop = false;
break;

Expand Down