https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100573
--- Comment #16 from Jakub Jelinek <jakub at gcc dot gnu.org> --- (In reply to Alexander Monakov from comment #14) > I would break in gdb on cuModuleGetFunction and > > x/s $rdx > > to print the failing symbol (it's the third argument to the function). > > It seems the "inner" entrypoint (which your patch attempted to nullify) is > still registered in offload tables, so the plugin takes its name from the > offload table and attempts to look it up in the offloaded code? Thread 1 "target-41.exe" hit Breakpoint 1, 0x00007ffff66de530 in cuModuleGetFunction () from /lib64/libcuda.so.1 (gdb) x/1s $rdx 0x477780: "foo$_omp_fn$0" Isn't that symbol in the offload tables normally though or do we treat it there differently?