https://gcc.gnu.org/bugzilla/show_bug.cgi?id=100573

--- Comment #16 from Jakub Jelinek <jakub at gcc dot gnu.org> ---
(In reply to Alexander Monakov from comment #14)
> I would break in gdb on cuModuleGetFunction and
> 
>   x/s $rdx
> 
> to print the failing symbol (it's the third argument to the function).
> 
> It seems the "inner" entrypoint (which your patch attempted to nullify) is
> still registered in offload tables, so the plugin takes its name from the
> offload table and attempts to look it up in the offloaded code?

Thread 1 "target-41.exe" hit Breakpoint 1, 0x00007ffff66de530 in
cuModuleGetFunction () from /lib64/libcuda.so.1
(gdb) x/1s $rdx
0x477780:       "foo$_omp_fn$0"

Isn't that symbol in the offload tables normally though or do we treat it there
differently?

Reply via email to