Hi,
On 25.9.2024 20.13, Andreas Schwab wrote:
On Sep 25 2024, Eero Tamminen wrote:
Hatari debugger backtrace does not rely on frame pointers or stack content
unwinding, i.e. it's immune to stack corruption.
That has nothing to do with stack corruption. Valid user-space
addresses can very well happen to match kernel adresses, since the
address spaces overlap.
Hatari profiler & debugger (currently) support only physical addresses,
so that's not the case.
- Eero
Lack of MMU / address translation support in them is not a problem for
what they're normally used [1], as neither TOS, nor 99.9% of the stuff
run under it, use/need that.
However, with Linux, it means them being mainly useful for debugging
what happens on kernel side. I do not think that to be too much of a
problem though, as kernel side is the hard part and there are good
alternatives for debugging user-space.
---
[1] E.g. optimizations in latest ScummVM upstream releases that make it
work OK on original Atari TT & Falcon HW, and (enhanced) Doom I version
that runs OK on original Atari Falcon.