fix uprobe examples to read correct argument
diff --git a/examples/tracing/strlen_count.py b/examples/tracing/strlen_count.py
index dfc98d3..7d2db89 100755
--- a/examples/tracing/strlen_count.py
+++ b/examples/tracing/strlen_count.py
@@ -24,13 +24,13 @@
 BPF_HASH(counts, struct key_t);
 
 int count(struct pt_regs *ctx) {
-    if (!PT_REGS_PARM2(ctx))
+    if (!PT_REGS_PARM1(ctx))
         return 0;
 
     struct key_t key = {};
     u64 zero = 0, *val;
 
-    bpf_probe_read(&key.c, sizeof(key.c), (void *)PT_REGS_PARM2(ctx));
+    bpf_probe_read(&key.c, sizeof(key.c), (void *)PT_REGS_PARM1(ctx));
     val = counts.lookup_or_init(&key, &zero);
     (*val)++;
     return 0;
diff --git a/examples/tracing/strlen_snoop.py b/examples/tracing/strlen_snoop.py
index 9ee058a..c3c7199 100755
--- a/examples/tracing/strlen_snoop.py
+++ b/examples/tracing/strlen_snoop.py
@@ -26,7 +26,7 @@
 bpf_text = """
 #include <uapi/linux/ptrace.h>
 int printarg(struct pt_regs *ctx) {
-    if (!PT_REGS_PARM2(ctx))
+    if (!PT_REGS_PARM1(ctx))
         return 0;
 
     u32 pid = bpf_get_current_pid_tgid();
@@ -34,7 +34,7 @@
         return 0;
 
     char str[80] = {};
-    bpf_probe_read(&str, sizeof(str), (void *)PT_REGS_PARM2(ctx));
+    bpf_probe_read(&str, sizeof(str), (void *)PT_REGS_PARM1(ctx));
     bpf_trace_printk("%s\\n", &str);
 
     return 0;