https://sourceware.org/bugzilla/show_bug.cgi?id=30150
--- Comment #31 from Lev Veyde <lveyde at gmail dot com> --- I verified that the patch fixes a lot of cases, including the ones that haven't been noticed initially (these can be easily spotted by comparing 10000-test.txt to 10000-test-new.txt). I would like to thank Nick and Alan for fixing it so quickly. While doing verification and cross checks I noticed another issue though, one that also shows itself only in pipe mode. It seems that symbols at addresses 0xffffffff81002020 - 0xffffffff810026e0 all resolve to hypercall_page located at 0xffffffff81002000. That is instead of resolving it to the actual symbols like xen_hypercall_mmu_update, xen_hypercall_set_gdt, xen_hypercall_stack_switch etc. All in all it seems to affect 48 consecutive addresses and symbols. -- You are receiving this mail because: You are on the CC list for the bug.