https://sourceware.org/bugzilla/show_bug.cgi?id=30150

--- Comment #31 from Lev Veyde <lveyde at gmail dot com> ---
I verified that the patch fixes a lot of cases, including the ones that haven't
been noticed initially (these can be easily spotted by comparing 10000-test.txt
to 10000-test-new.txt).

I would like to thank Nick and Alan for fixing it so quickly.


While doing verification and cross checks I noticed another issue though, one
that also shows itself only in pipe mode.

It seems that symbols at addresses 0xffffffff81002020 - 0xffffffff810026e0 all
resolve to hypercall_page located at 0xffffffff81002000.

That is instead of resolving it to the actual symbols like
xen_hypercall_mmu_update, xen_hypercall_set_gdt, xen_hypercall_stack_switch
etc.

All in all it seems to affect 48 consecutive addresses and symbols.

-- 
You are receiving this mail because:
You are on the CC list for the bug.

Reply via email to