diff --git a/cmd/agent/plugin/probe.bpf.c b/cmd/agent/plugin/probe.bpf.c index 3bc6067f2bbcccb14cf1c54a5a29404ad6586d39..975adca8523f5b2240efd66be97f451dd1f9d4ff 100644 --- a/cmd/agent/plugin/probe.bpf.c +++ b/cmd/agent/plugin/probe.bpf.c @@ -141,7 +141,7 @@ int handle_tcp_state(struct trace_event_raw_inet_sock_set_state *ctx) return __handle_tcp_state(ctx); } -// protocol recieve +// protocol receive SEC("kprobe/tcp_sendmsg") int BPF_KPROBE(kp_tcp_sendmsg, struct sock *sk, struct msghdr *msg, size_t size) { diff --git a/cmd/agent/plugin/probe.c b/cmd/agent/plugin/probe.c index 66bb25c81e12d365559ef69cfd3c117698bec70b..cc0ba0a3b7a11942b7db2aac663ee401eeaccedf 100755 --- a/cmd/agent/plugin/probe.c +++ b/cmd/agent/plugin/probe.c @@ -37,7 +37,7 @@ static const struct argp_option opts[] = { {"port_distribution", 'P', 0, 0, "statistical use of top10 destination ports"}, {"drop_info", 'i', 0, 0, "trace the iptables drop"}, {"drop_skb", 'd', 0, 0, "trace the all skb drop"}, - {"packet_count", 'c', 0, 0, "trace the packet include SYN、SYN-ACK、FIN"}, + {"packet_count", 'c', 0, 0, "trace the packet including SYN、SYN-ACK、FIN"}, {"tcpconn", 'T', 0, 0, "trace the tcp connect"}, {}, }; diff --git a/cmd/agent/plugin/traffic.bpf.h b/cmd/agent/plugin/traffic.bpf.h index 3c248c9a00bb1a363a5604f2cbda9adbc4641c24..98cd44591b7ced84d8f5a5a0e0b7acab1a2b9e79 100644 --- a/cmd/agent/plugin/traffic.bpf.h +++ b/cmd/agent/plugin/traffic.bpf.h @@ -215,7 +215,7 @@ static __always_inline int __tcp_sendmsg(struct sock *sk, struct msghdr *msg, si return 0; } -// recieve +// receive static __always_inline int __tcp_cleanup_rbuf(struct sock *sk, int copied) { int pid = get_current_tgid();