On Sep 25 2024, Eero Tamminen wrote:
Hatari debugger backtrace does not rely on frame pointers or stack content unwinding, i.e. it's immune to stack corruption.
That has nothing to do with stack corruption. Valid user-space addresses can very well happen to match kernel adresses, since the address spaces overlap. -- Andreas Schwab, schwab@xxxxxxxxxxxxxx GPG Key fingerprint = 7578 EB47 D4E5 4D69 2510 2552 DF73 E780 A9DA AEC1 "And now for something completely different."