Become a leader in the IoT community!

Join our community of embedded and IoT practitioners to contribute experience, learn new skills and collaborate with other developers with complementary skillsets.

Step 1 of 5

CREATE YOUR PROFILE *Required

OR
Step 2 of 5

WHAT BRINGS YOU TO DEVHEADS? *Choose 1 or more

Connect & collaborate 🤝with other tech professionals
Learn & Grow 📚
Contribute Experience & Expertise 🔧
Step 3 of 5

WHAT'S YOUR INTEREST OR EXPERTISE? *Choose 1 or more

Hardware Design 💡
Embedded Software 💻
Edge Networking
Step 4 of 5

Personalize your profile

Step 5 of 5

Read & agree to our COMMUNITY RULES

  1. We want this server to be a welcoming space! Treat everyone with respect. Absolutely no harassment, witch hunting, sexism, racism, or hate speech will be tolerated.
  2. If you see something against the rules or something that makes you feel unsafe, let staff know by messaging @admin in the "support-tickets" tab in the Live DevChat menu.
  3. No age-restricted, obscene or NSFW content. This includes text, images, or links featuring nudity, sex, hard violence, or other graphically disturbing content.
  4. No spam. This includes DMing fellow members.
  5. You must be over the age of 18 years old to participate in our community.
  6. You agree to our Terms of Service (https://www.devheads.io/terms-of-service/) and Privacy Policy (https://www.devheads.io/privacy-policy)
By clicking "Finish", you have read and agreed to the our Terms of Service and Privacy Policy.

Understanding cmp Instruction in Assembly and Debugging with GDB

I’ve come across a specific instruction sequence that I need help understanding, particularly the comparison (`cmp`) operation and how to break at this point in GDB on an Intel Core i7-11700K Rocket Lake processor . It’s low level assembly debugging in C and assembly mix

0x0000000000001410 <+241>:    mov    eax,DWORD PTR [rbp-0x74]
0x0000000000001413 <+244>:    cmp    DWORD PTR [rbp-0x70],eax
0x0000000000001416 <+247>:    jne    0x149d <main+382>
0x000000000000141c <+253>:    lea    rsi,[rip+0xbf7]        # 0x201a

I’m particularly interested in the `cmp` instruction at `0x0000000000001413`. From what I understand, it compares the value stored at `[rbp-0x70]` with the value currently in the `eax` register.

What exactly is this `cmp` operation checking tho?

What happens if the values are not equal?

And how can I set a breakpoint at this comparison line in GDB to inspect the values before the comparison happens?

I tried to break at the memory address `0x0000000000001413` using `break *0x0000000000001413`, but I’m not sure if that’s the correct approach

  1. 32bitSaviour#0000

    The `cmp`, often integer comparison, compare the values then sets a condition flag which jump instructions rely on to make jump decisions. `cmp` works by subtraction (cmp a, b == b-a)

    Use `info registers` in gdb to peek at registers.

  2. Marvee Amasi#0000

    So if cmp is setting the condition flags based on eax – [rbp-0x70], it must be setting the zero flag (ZF) in case they’re equal, which the jne instruction relies on to decide whether to jump or not, correct?

  3. 32bitSaviour#0000

    Correct.

  4. marveeamasi#0

    Thanks 👍

CONTRIBUTE TO THIS THREAD

Browse other questions tagged 

Leaderboard

RANKED BY XP

All time
  • 1.
    Avatar
    @Nayel115
    1620 XP
  • 2.
    Avatar
    @UcGee
    650 XP
  • 3.
    Avatar
    @melta101
    600 XP
  • 4.
    Avatar
    @chitour
    600 XP
  • 5.
    Avatar
    @lifegochi
    250 XP
  • 6.
    Avatar
    @Youuce
    180 XP