| Re: [hatari-devel] Using Hatari to debug custom version of EMUTOS | 
[ Thread Index | 
Date Index
| More lists.tuxfamily.org/hatari-devel Archives
] 
Thank you again Eero!
I was able to use my linux version of Hatari to generate the list of 
functions/labels visited. I did the same using my "own" (when I say own, 
I modified someone else's great work to add extra features!) emulator. I 
get a disassembled trace of the full EMUTOS boot process. I then use 
grep to create a list of all the labels. I then used tkdiff to compare 
the EMUTOS boot log and my own. After some fiddling and removal of 
slight differences, I was able to find where the deviation was. This led 
me to find a bug in my code where I had incorrectly changed the AES 
process stack.
BTW. If I compile a custom version of EMUTOS and add the "ENABLE_KDEBUG" 
define to enable RS232 output debugging, is there a way to either view 
this separately in Hatari or capture the text? I have enabled this in my 
own codebase and this also has greatly helped to debug the EMUTOS boot 
problems in my own emulator. In the source code I "intercept" the write 
to the UART TX register (part of my customisation) and write a special 
string "UART TX" to the screen debug log which can be trivially filtered 
out using grep. I then join all the characters to get a nice clean log file.
I will say more about my custom version of EMUTOS (*) on that mailing 
list, once I have the code running on real hardware. Just today I 
finally have the emulator successfully reaching the GEM desktop and I 
see it stuck in a loop waiting for I/O. My emulator runs a fraction(!) 
of Hatari speed, so I see all the screen draws as if in slow motion :-) 
.. If I remove the disassembly then it should run a lot faster.
(*) Since my hardware is custom I cannot run the code on Hatari.
I appreciate you taking the time to reply to my questions, both here and 
on the EMUTOS mailing list.
--
This email has been checked for viruses by Avast antivirus software.
https://www.avast.com/antivirus