This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
error to run systemtap in an ARM platform
- From: Da Zheng <zhengda1936 at gmail dot com>
- To: systemtap at sourceware dot org
- Date: Thu, 14 Jul 2011 17:58:16 -0700
- Subject: error to run systemtap in an ARM platform
Hello,
I cross-compiled systemtap and tried to run it on an ARM platform, but
got the following error:
chronos@localhost ~ $ sudo stap --vp 01 syscalls_by_pid.stp
semantic error: unresolved arity-4 function: identifier
'_arch_ptrace_argstr' at /usr/share/systemtap/tapset/aux_syscalls.stp:2234:9
source: retval=_arch_ptrace_argstr(request, pid, addr, data)
^
Pass 2: analyzed script: 285 probe(s), 1528 function(s), 21 embed(s), 1
global(s) using 112076virt/96408res/46364shr kb, in
3690usr/190sys/4041real ms.
Pass 2: analysis failed. Try again with another '--vp 01' option.
my script is just a file doing nothing, which is attached in the end of
the email.
The version of systemtap is 1.5/0.131, I download from
http://sourceware.org/systemtap/ftp/releases/systemtap-1.5.tar.gz. The
kernel version is 2.6.38.3.
I got some errors when I cross compile systemtap. At first, configure
fails, so I have to give the following variables an empty value
export ac_cv_file__usr_include_nss3=
export ac_cv_file__usr_include_nss=
export ac_cv_file__usr_include_nspr4=
export ac_cv_file__usr_include_nspr=
export ac_cv_file__usr_include_avahi_client=
export ac_cv_file__usr_include_avahi_common=
Then I remove -Werror in runtime/staprun/Makefile.in because
__SDT_COND_SIGNED(wchar_t) in includes/sys/sdt.h generates error. I
wonder if the complication errors I got have anything to do with the
runtime error I get.
Does anyone know how to fix the runtime error?
Thanks,
Da
#! /usr/bin/env stap
# Copyright (C) 2006 IBM Corp.
#
# This file is part of systemtap, and is free software. You can
# redistribute it and/or modify it under the terms of the GNU General
# Public License (GPL); either version 2, or (at your option) any
# later version.
#
# Print the system call count by process ID in descending order.
#
probe begin {
}
probe syscall.* {
}
probe end {
}