@@ -8,8 +8,8 @@ set -e -o pipefail
8
8
# non root users
9
9
PATH=/usr/local/bin:/usr/bin:/bin:/usr/local/sbin:/usr/sbin:/sbin
10
10
11
- # non root users are not able to access some kernel params, so they get blacklisted
12
- SYSCTL_BLACKLIST ='
11
+ # non root users are not able to access some kernel params, so they get excluded
12
+ SYSCTL_EXCLUDE ='
13
13
dev.parport.parport0.autoprobe
14
14
fs.protected_hardlinks
15
15
fs.protected_fifos
@@ -29,9 +29,9 @@ SYSCTL_BLACKLIST='
29
29
vm.mmap_rnd_compat_bits
30
30
vm.stat_refresh'
31
31
32
- SYSCTL_BLACKLIST_REGEX =" $( printf ' \|%s' $SYSCTL_BLACKLIST ) "
32
+ SYSCTL_EXCLUDE_REGEX =" $( printf ' \|%s' $SYSCTL_EXCLUDE ) "
33
33
# strip leading '\|'
34
- SYSCTL_BLACKLIST_REGEX =${SYSCTL_BLACKLIST_REGEX : 2}
34
+ SYSCTL_EXCLUDE_REGEX =${SYSCTL_EXCLUDE_REGEX : 2}
35
35
36
36
function perform_test {
37
37
probecheck " sysctl" || return 255
@@ -58,11 +58,11 @@ case $(uname) in
58
58
# sysctl has duplicities in output
59
59
# hide permission errors like: "sysctl: permission denied on key 'fs.protected_hardlinks'"
60
60
# kernel parameters might use "/" and "." separators interchangeably - normalizing
61
- sysctl -aN --deprecated 2> /dev/null | grep -v $SYSCTL_BLACKLIST_REGEX | tr " /" " ." | sort -u > " $sysctlNames "
61
+ sysctl -aN --deprecated 2> /dev/null | grep -v $SYSCTL_EXCLUDE_REGEX | tr " /" " ." | sort -u > " $sysctlNames "
62
62
;;
63
63
esac
64
64
65
- grep unix-sys:name " $result " | grep -v $SYSCTL_BLACKLIST_REGEX | xsed -E ' s;.*>(.*)<.*;\1;g' | sort > " $ourNames "
65
+ grep unix-sys:name " $result " | grep -v $SYSCTL_EXCLUDE_REGEX | xsed -E ' s;.*>(.*)<.*;\1;g' | sort > " $ourNames "
66
66
67
67
# If procps_ver > 3.3.12 we need to filter *stable_secret and vm.stat_refresh
68
68
# options from the sysctl output, for more details see
0 commit comments