From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 19487 invoked by alias); 20 Nov 2018 07:31:16 -0000 Mailing-List: contact gdb-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-owner@sourceware.org Received: (qmail 19462 invoked by uid 89); 20 Nov 2018 07:31:15 -0000 Authentication-Results: sourceware.org; auth=none X-Spam-SWARE-Status: No, score=1.8 required=5.0 tests=BAYES_50,HTML_MESSAGE,KAM_LAZY_DOMAIN_SECURITY autolearn=no version=3.3.2 spammy=walter, Walter, gentlemen, ladies X-HELO: thoth.sbs.de Received: from thoth.sbs.de (HELO thoth.sbs.de) (192.35.17.2) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Tue, 20 Nov 2018 07:31:13 +0000 Received: from mail2.sbs.de (mail2.sbs.de [192.129.41.66]) by thoth.sbs.de (8.15.2/8.15.2) with ESMTPS id wAK7VAox028683 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Tue, 20 Nov 2018 08:31:10 +0100 Received: from DEFTHW99ERLMSX.ww902.siemens.net (defthw99erlmsx.ww902.siemens.net [139.22.70.136]) by mail2.sbs.de (8.15.2/8.15.2) with ESMTPS id wAK7V9Ec002030 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Tue, 20 Nov 2018 08:31:09 +0100 Received: from DENBGAT9ERJMSX.ww902.siemens.net (139.22.70.139) by DEFTHW99ERLMSX.ww902.siemens.net (139.22.70.136) with Microsoft SMTP Server (TLS) id 14.3.408.0; Tue, 20 Nov 2018 08:31:09 +0100 Received: from DENBGAT9EH3MSX.ww902.siemens.net ([169.254.7.49]) by DENBGAT9ERJMSX.ww902.siemens.net ([139.22.70.139]) with mapi id 14.03.0415.000; Tue, 20 Nov 2018 08:31:08 +0100 From: "Stoll, Walter" To: "gdb@sourceware.org" Subject: Breakpoint loss under low memory conditions Date: Tue, 20 Nov 2018 07:31:00 -0000 Message-ID: <25100483E4CD1F4087B0A40EBF04FFBD1D5BE7B7@DENBGAT9EH3MSX.ww902.siemens.net> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-SW-Source: 2018-11/txt/msg00016.txt.bz2 Ladies and Gentlemen Under low memory conditions, the Linux kernel may evict pages that contain = executable code sections. If such a page was modified by a breakpoint, then= the breakpoint will get lost when the page is finally faulted in. Is this = a scenario that can happen in reality or does gdb and/or the kernel provide= some means which prevent this from happening ? Regards Walter Stoll