GDB: etm traces decoding and breakpoints for arm targets

2020-11-02 Thread Zied Guermazi
hi, while testing the implementation in gdb of branch tracing on arm processors using etm, I faced the the situation where a breakpoint was set, was hit and then the execution of the program was continued.  While decoding generated traces,  I got the address of the breakpoint (0x400552) exec

Re: GDB: etm traces decoding and breakpoints for arm targets

2020-11-02 Thread Omair Javaid
Hi Zied From what I understood from your description, you are looking for a way to mitigate the effects of BKPT instruction in trace data. Also the description you have about how software breakpoints work is correct. We write a trap (usually BKPT instruction or any variant of BKPT) to the breakpoi