compile it with -g argument, it`s work fine. Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx> 于2022年6月1日周三 07:03写道: > > On Wed, May 25, 2022 at 1:10 PM Ye ZhengMao <yezhengmaolove@xxxxxxxxx> wrote: > > > > i using cross compiler to compile the bpftool for aarch64 and when gen > > skeleton for the minimal.bpf.o, bpftool core. > > > > libbpf: loading object 'minimal_bpf' from buffer > > libbpf: elf: section(2) tp/syscalls/sys_enter_write, size 104, link 0, > > flags 6, type=1 > > you should have seen a message about discovering a program here. Can > you share that .bpf.o file, somehow libbpf can't find program entry. > > > > libbpf: elf: section(3) license, size 13, link 0, flags 3, type=1 > > libbpf: license of minimal_bpf is Dual BSD/GPL > > libbpf: elf: section(4) .bss, size 4, link 0, flags 3, type=8 > > libbpf: elf: section(5) .rodata, size 28, link 0, flags 2, type=1 > > libbpf: elf: section(6) .symtab, size 192, link 8, flags 0, type=2 > > libbpf: elf: section(7) .reltp/syscalls/sys_enter_write, size 32, link > > 6, flags 0, type=9 > > libbpf: looking for externs among 8 symbols... > > libbpf: collected 0 externs total > > libbpf: map 'minimal_.bss' (global data): at sec_idx 4, offset 0, flags 400. > > libbpf: map 0 is "minimal_.bss" > > libbpf: map 'minimal_.rodata' (global data): at sec_idx 5, offset 0, flags 480. > > libbpf: map 1 is "minimal_.rodata" > > libbpf: sec '.reltp/syscalls/sys_enter_write': collecting relocation > > for section(2) 'tp/syscalls/sys_enter_write' > > libbpf: sec '.reltp/syscalls/sys_enter_write': relo #0: insn #2 against 'my_pid' > > Segmentation fault (core dumped) > > > > core in function find_prog_by_sec_insn > > > > i using gdb to found the obj->nr_programs == 0 > > prog = &obj->programs[l]; can`t work fine