Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1161051AbWI2MtH (ORCPT ); Fri, 29 Sep 2006 08:49:07 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1161050AbWI2MtH (ORCPT ); Fri, 29 Sep 2006 08:49:07 -0400 Received: from mx2.mail.elte.hu ([157.181.151.9]:55727 "EHLO mx2.mail.elte.hu") by vger.kernel.org with ESMTP id S1161051AbWI2MtE (ORCPT ); Fri, 29 Sep 2006 08:49:04 -0400 Date: Fri, 29 Sep 2006 14:40:46 +0200 From: Ingo Molnar To: john stultz Cc: "K.R. Foley" , tglx@linutronix.de, linux-kernel@vger.kernel.org, "Paul E. McKenney" , Dipankar Sarma , Arjan van de Ven , Andrew Morton Subject: Re: 2.6.18-rt1 Message-ID: <20060929124045.GA30558@elte.hu> References: <20060920141907.GA30765@elte.hu> <45118EEC.2080700@cybsft.com> <20060920194958.GA24691@elte.hu> <4511A57D.9070500@cybsft.com> <1158784863.5724.1027.camel@localhost.localdomain> <4511A98A.4080908@cybsft.com> <1158866166.12028.9.camel@localhost.localdomain> <20060922115854.GA12684@elte.hu> <1159404123.5532.3.camel@localhost> <1159483731.25415.12.camel@localhost> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1159483731.25415.12.camel@localhost> User-Agent: Mutt/1.4.2.1i X-ELTE-SpamScore: -2.8 X-ELTE-SpamLevel: X-ELTE-SpamCheck: no X-ELTE-SpamVersion: ELTE 2.0 X-ELTE-SpamCheck-Details: score=-2.8 required=5.9 tests=ALL_TRUSTED,AWL,BAYES_50 autolearn=no SpamAssassin version=3.0.3 -3.3 ALL_TRUSTED Did not pass through any untrusted hosts 0.5 BAYES_50 BODY: Bayesian spam probability is 40 to 60% [score: 0.4593] -0.0 AWL AWL: From: address is in the auto white-list X-ELTE-VirusStatus: clean Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1000 Lines: 32 * john stultz wrote: > [snip] > > c03879e8 r __ksymtab_find_next_bit > > c03879f0 r __ksymtab_find_next_zero_bit > > c03879f8 R __write_lock_failed > > c0387a18 R __read_lock_failed > > c0387a2c r __ksymtab___delay > > c0387a34 r __ksymtab___const_udelay > > c0387a3c r __ksymtab___udelay > > c0387a44 r __ksymtab___ndelay > > > > That __read/__write_lock_failed bit looks wrong. > > > So it seems gcc 3.4.4 misplaces the __write_lock_failed function into > the ksymtab. It doesn't happen w/ 4.0.3. i think it's an ld bug, and it's related to the nested .section/.previous use in the LOCK_PREFIX macro in include/asm-i386/alternatives.h. this is the second time i have seen smp-alternatives related linker breakage. Ingo - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/