diff --git a/README.md b/README.md index 5dc119af..2b3fb99b 100644 --- a/README.md +++ b/README.md @@ -103,8 +103,8 @@ This project is mainly based on [libbpf](https://github.com/libbpf/libbpf) frame ## Install deps and Compile -- For libbpf based: see [src/11-bootstrap](https://github.com/eunomia-bpf/bpf-developer-tutorial/blob/main/src/11-bootstrap/README_en.md) -- For eunomia-bpf based: see [src/1-helloworld](https://github.com/eunomia-bpf/bpf-developer-tutorial/blob/main/src/1-helloworld/README_en.md) +- For libbpf based: see [src/11-bootstrap](https://github.com/eunomia-bpf/bpf-developer-tutorial/blob/main/src/11-bootstrap/README.md) +- For eunomia-bpf based: see [src/1-helloworld](https://github.com/eunomia-bpf/bpf-developer-tutorial/blob/main/src/1-helloworld/README.md) ## GitHub Templates: Easily build eBPF projects and development environments, compile and run eBPF programs online with one click diff --git a/src/5-uprobe-bashreadline/README.md b/src/5-uprobe-bashreadline/README.md index 6a9f7958..a005075f 100644 --- a/src/5-uprobe-bashreadline/README.md +++ b/src/5-uprobe-bashreadline/README.md @@ -58,7 +58,7 @@ In the printret function, we first obtain the process name and process ID of the In addition, we also need to define the uprobe probe using the SEC macro and define the probe function using the BPF_KRETPROBE macro.In the `SEC` macro in the code above, we need to specify the type of the uprobe, the path of the binary file to capture, and the name of the function to capture. For example, the definition of the `SEC` macro in the code above is as follows: ```c -SEC("uprobe//bin/bash:readline") +SEC("uretprobe//bin/bash:readline") ``` This indicates that we want to capture the `readline` function in the `/bin/bash` binary file. diff --git a/src/5-uprobe-bashreadline/README.zh.md b/src/5-uprobe-bashreadline/README.zh.md index 20e321a0..1ff6dcbd 100644 --- a/src/5-uprobe-bashreadline/README.zh.md +++ b/src/5-uprobe-bashreadline/README.zh.md @@ -70,7 +70,7 @@ char LICENSE[] SEC("license") = "GPL"; 在 SEC 宏中,我们需要指定 uprobe 的类型、要捕获的二进制文件的路径和要捕获的函数名称。例如,上面的代码中的 SEC 宏的定义如下: ```c -SEC("uprobe//bin/bash:readline") +SEC("uretprobe//bin/bash:readline") ``` 这表示我们要捕获的是 /bin/bash 二进制文件中的 readline 函数。