From 1dd0d85fc0634d2dbe7f7d06d176c2ff548e6332 Mon Sep 17 00:00:00 2001 From: David Anderson Date: Mon, 28 Mar 2016 01:10:31 -0700 Subject: [PATCH] bpf: correct spelling of marshaling in package doc. Change-Id: Ied9b2589b4aa5cb445dd368864df047c84848a95 Reviewed-on: https://go-review.googlesource.com/21217 Reviewed-by: Mikio Hara --- bpf/doc.go | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/bpf/doc.go b/bpf/doc.go index a715ab26..bf2564b7 100644 --- a/bpf/doc.go +++ b/bpf/doc.go @@ -4,16 +4,16 @@ /* -Package bpf implements marshalling and unmarshalling of programs -for the Berkeley Packet Filter virtual machine. +Package bpf implements marshaling and unmarshaling of programs for the +Berkeley Packet Filter virtual machine. -BPF's main use is to specify a packet filter for network taps, so -that the kernel doesn't have to expensively copy every packet it -sees to userspace. However, it's been repurposed to other areas -where running user code in-kernel is needed. For example, Linux's -seccomp uses BPF to apply security policies to system calls. For -simplicity, this documentation refers only to packets, but other -uses of BPF have their own data payloads. +BPF's main use is to specify a packet filter for network taps, so that +the kernel doesn't have to expensively copy every packet it sees to +userspace. However, it's been repurposed to other areas where running +user code in-kernel is needed. For example, Linux's seccomp uses BPF +to apply security policies to system calls. For simplicity, this +documentation refers only to packets, but other uses of BPF have their +own data payloads. BPF programs run in a restricted virtual machine. It has almost no access to kernel functions, and while conditional branches are