Hi!
No idea how to do it on hardware side.
Of course you can do a break on instruction fetch and check it for a call 
instruction, or a RET/RETI instruction (and the return address 
is found on stack). But that's rather slow (if not even slower).
Alternatively you can put a write access to a global 'trace' variable on every 
point you want to trace, and trigger a breakpoint when this 
address is written to. Would be better than a breakpoint on a timer interrupt, 
and allows tracing ISRs too.
But it is possible that not all MSPs support write-access triggers. The EEM 
isn't really good documented in the users guides.

JMGross

----- Ursprüngliche Nachricht -----
Von: Sergei Sharonov
Gesendet am: 14.Juni.2012 05:04:55

Sorry if this is a bit of topic, but did anybody manage to get trace working
with FET430UIF? I got src code for MSP430.dll V3 and some appnotes from
TI but so far no go.
The goal is to use it for statistical profiling. Currently I simply grab 
PC from
a randomized timer interrupt but that requires code instrumentation and
does not account for any ISRs.
Regards,

Sergei


------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Mspgcc-users mailing list
Mspgcc-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/mspgcc-users

Reply via email to