mirror of
https://github.com/golang/net.git
synced 2026-03-31 18:37:08 +09:00
bpf: correct spelling of marshaling in package doc.
Change-Id: Ied9b2589b4aa5cb445dd368864df047c84848a95 Reviewed-on: https://go-review.googlesource.com/21217 Reviewed-by: Mikio Hara <mikioh.mikioh@gmail.com>
This commit is contained in:
committed by
Mikio Hara
parent
27276f6b36
commit
1dd0d85fc0
18
bpf/doc.go
18
bpf/doc.go
@@ -4,16 +4,16 @@
|
||||
|
||||
/*
|
||||
|
||||
Package bpf implements marshalling and unmarshalling of programs
|
||||
for the Berkeley Packet Filter virtual machine.
|
||||
Package bpf implements marshaling and unmarshaling of programs for the
|
||||
Berkeley Packet Filter virtual machine.
|
||||
|
||||
BPF's main use is to specify a packet filter for network taps, so
|
||||
that the kernel doesn't have to expensively copy every packet it
|
||||
sees to userspace. However, it's been repurposed to other areas
|
||||
where running user code in-kernel is needed. For example, Linux's
|
||||
seccomp uses BPF to apply security policies to system calls. For
|
||||
simplicity, this documentation refers only to packets, but other
|
||||
uses of BPF have their own data payloads.
|
||||
BPF's main use is to specify a packet filter for network taps, so that
|
||||
the kernel doesn't have to expensively copy every packet it sees to
|
||||
userspace. However, it's been repurposed to other areas where running
|
||||
user code in-kernel is needed. For example, Linux's seccomp uses BPF
|
||||
to apply security policies to system calls. For simplicity, this
|
||||
documentation refers only to packets, but other uses of BPF have their
|
||||
own data payloads.
|
||||
|
||||
BPF programs run in a restricted virtual machine. It has almost no
|
||||
access to kernel functions, and while conditional branches are
|
||||
|
||||
Reference in New Issue
Block a user