The BRK is a lie
The bug
IDA thinks that BRK on ARM64 doesn't stop the execution flow.
The consequences
Programs often use BRK to crash when something wrong happen (assert fail, security condition unmet etc.), to crash the program or let the analyst attach it's debugger. As IDA thinks that the execution continue after the BRK, this break all its analysis. This can be especially painful to fix especially if the BRK is just before an address table or in the middle of a function.
The support answers (and why they are wrong)
read more...I'm not sure stopping the flow on BRK is a good …