From 330dd3a07d9df92aebfd7c29b656138f8f09f468 Mon Sep 17 00:00:00 2001 From: Shane Utt Date: Tue, 24 Jan 2023 09:58:49 -0500 Subject: [PATCH] fix typo in several pages (#90) --- docs/book/aya/aya-tool.md | 2 +- docs/book/programs/lsm.md | 2 +- docs/book/programs/probes.md | 4 ++-- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/docs/book/aya/aya-tool.md b/docs/book/aya/aya-tool.md index 21d1a9a8..a0a23b5b 100644 --- a/docs/book/aya/aya-tool.md +++ b/docs/book/aya/aya-tool.md @@ -2,7 +2,7 @@ !!! example "Source Code" - Full code for the example in this chapter is availble [here](https://github.com/aya-rs/book/tree/main/examples/aya-tool) + Full code for the example in this chapter is available [here](https://github.com/aya-rs/book/tree/main/examples/aya-tool) Very often you will need to use type definitions that your running Linux kernel uses in its source code. For example, you might need a definition of diff --git a/docs/book/programs/lsm.md b/docs/book/programs/lsm.md index da89274a..9d8b7862 100644 --- a/docs/book/programs/lsm.md +++ b/docs/book/programs/lsm.md @@ -2,7 +2,7 @@ !!! example "Source Code" - Full code for the example in this chapter is availble [here](https://github.com/aya-rs/book/tree/main/examples/lsm-nice) + Full code for the example in this chapter is available [here](https://github.com/aya-rs/book/tree/main/examples/lsm-nice) ## What is LSM LSM stands for [Linux Security Modules](https://en.wikipedia.org/wiki/Linux_Security_Modules) diff --git a/docs/book/programs/probes.md b/docs/book/programs/probes.md index 93eec3d3..10066556 100644 --- a/docs/book/programs/probes.md +++ b/docs/book/programs/probes.md @@ -2,11 +2,11 @@ !!! example "Source Code" - Full code for the example in this chapter is availble [here](https://github.com/aya-rs/book/tree/main/examples/kprobetcp). + Full code for the example in this chapter is available [here](https://github.com/aya-rs/book/tree/main/examples/kprobetcp). # What are the probes in eBPF? -The probe BPF programs attach to kernel (kprobes) or user-side (uprobes) functions and are able to access the function parameters of those functions. You can find more information about probes in the [kernel documentation](https://docs.kernel.org/trace/kprobes.html), icluding the difference between kprobes and kretprobes. +The probe BPF programs attach to kernel (kprobes) or user-side (uprobes) functions and are able to access the function parameters of those functions. You can find more information about probes in the [kernel documentation](https://docs.kernel.org/trace/kprobes.html), including the difference between kprobes and kretprobes. ## Example project