https://sourceware.org/bugzilla/show_bug.cgi?id=30150
--- Comment #35 from Nick Clifton <nickc at redhat dot com> --- (In reply to Lev Veyde from comment #31) > It seems that symbols at addresses 0xffffffff81002020 - 0xffffffff810026e0 > all resolve to hypercall_page located at 0xffffffff81002000. > > That is instead of resolving it to the actual symbols like > xen_hypercall_mmu_update, xen_hypercall_set_gdt, xen_hypercall_stack_switch > etc. > > All in all it seems to affect 48 consecutive addresses and symbols. This should now be fixed. -- You are receiving this mail because: You are on the CC list for the bug.