Skip to content

Commit 2d373ef

Browse files
Hawk777petreeftime
authored andcommitted
Reword mismatch_action description
Claiming that `mismatch_action` is used for syscalls that do not match *any rules* is incorrect. A syscall number mapped to an empty `Vec` is considered to match the filter and therefore uses the `match_action` instead, despite not matching any rules (because no rules even exist). Signed-off-by: Christopher Head <[email protected]>
1 parent b6907ec commit 2d373ef

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

src/backend/filter.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ impl SeccompFilter {
2626
/// # Arguments
2727
///
2828
/// * `rules` - Map containing syscall numbers and their respective [`SeccompRule`]s.
29-
/// * `mismatch_action` - [`SeccompAction`] taken for all syscalls that do not match any rule.
29+
/// * `mismatch_action` - [`SeccompAction`] taken for all syscalls that do not match the filter.
3030
/// * `match_action` - [`SeccompAction`] taken for system calls that match the filter.
3131
/// * `target_arch` - Target architecture of the generated BPF filter.
3232
///

0 commit comments

Comments
 (0)