mirror of
https://github.com/eunomia-bpf/bpf-developer-tutorial.git
synced 2026-02-03 18:24:27 +08:00
fix invalid link in index
This commit is contained in:
@@ -55,7 +55,7 @@
|
||||
- [eBPF 运行时的安全性与面临的挑战](18-further-reading/ebpf-security.zh.md)
|
||||
- [用户空间 eBPF 运行时:深度解析与应用实践](src\36-userspace-ebpf\README.md)
|
||||
|
||||
# bcc 教程与文档
|
||||
# bcc 和 bpftrace 教程与文档
|
||||
|
||||
- [BPF Features by Linux Kernel Version](bcc-documents/kernel-versions.md)
|
||||
- [Kernel Configuration for BPF Features](bcc-documents/kernel_config.md)
|
||||
@@ -63,3 +63,4 @@
|
||||
- [Special Filtering](bcc-documents/special_filtering.md)
|
||||
- [bcc Tutorial](bcc-documents/tutorial.md)
|
||||
- [bcc Python Developer Tutorial](bcc-documents/tutorial_bcc_python_developer.md)
|
||||
- [bpftrace Tutorial](bpftrace-tutorial/README.md)
|
||||
|
||||
@@ -43,12 +43,6 @@ We start to build complete eBPF projects mainly based on `libbpf` and combine th
|
||||
|
||||
This section covers advanced topics related to eBPF, including using eBPF programs on Android, possible attacks and defenses using eBPF programs, and complex tracing. Combining the user-mode and kernel-mode aspects of eBPF can bring great power (as well as security risks).
|
||||
|
||||
<<<<<<< HEAD
|
||||
- [Using eBPF programs on Android](22-android/README_en.md)
|
||||
- [Tracing HTTP requests or other layer-7 protocols using eBPF socket filter or syscall trace](23-http/README_en.md)
|
||||
- [Accelerating network request forwarding using sockops](29-sockops/README_en.md)
|
||||
- [Capturing Plain Text Data of Various Libraries' SSL/TLS Using uprobe](30-sslsniff/README_en.md)
|
||||
=======
|
||||
Android:
|
||||
|
||||
- [Using eBPF programs on Android](22-android/README.md)
|
||||
@@ -61,7 +55,6 @@ Networking and tracing:
|
||||
|
||||
Security:
|
||||
|
||||
>>>>>>> 89ab1d3 (fix index link in website)
|
||||
- [Use eBPF to modify syscall parameters](34-syscall/README.md)
|
||||
- [The Secure Path Forward for eBPF: Challenges and Innovations](18-further-reading/ebpf-security.md)
|
||||
- [Hiding process or file information using eBPF](24-hide/README.md)
|
||||
@@ -69,12 +62,15 @@ Security:
|
||||
- [Adding sudo users using eBPF](26-sudo/README.md)
|
||||
- [Replacing text read or written by any program using eBPF](27-replace/README.md)
|
||||
- [BPF lifecycle: Running eBPF programs continuously in Detached mode after user-mode applications exit](28-detach/README.md)
|
||||
- [Userspace eBPF Runtimes: Overview and Applications](src\36-userspace-ebpf\README.md)
|
||||
- [Userspace eBPF Runtimes: Overview and Applications](36-userspace-ebpf/README.md)
|
||||
|
||||
# bcc tutorial
|
||||
# bcc and bpftrace tutorial
|
||||
|
||||
For reference:
|
||||
|
||||
- [BPF Features by Linux Kernel Version](bcc-documents/kernel-versions.md)
|
||||
- [Kernel Configuration for BPF Features](bcc-documents/kernel_config.md)
|
||||
- [bcc Reference Guide](bcc-documents/reference_guide.md)
|
||||
- [Special Filtering](bcc-documents/special_filtering.md)
|
||||
- [bcc Tutorial](bcc-documents/tutorial.md)".- [bcc Python Developer Tutorial](bcc-documents/tutorial_bcc_python_developer.md)
|
||||
- [bpftrace Tutorial](bpftrace-tutorial/README.md)
|
||||
Reference in New Issue
Block a user