dpmitest$ ~/local.new/bin/dosemu -K "$PWD" -dumb -E "ldebugx.com /c='r dco or= 800;g' dpmistck.com" -I "cpu_vm_dpmi native" -I "serial { com 2 device /tmp/vptty-dos }" -td -kt -D9+M dosemu2 2.0pre9-dev-20220422-129-g0470b1a59 Configured: 2022-04-21 22:03:28 +0000 Get the latest code at http://dosemu2.github.io/dosemu2 Submit Bugs via https://github.com/dosemu2/dosemu2/issues Ask for help in mail list: linux-msdos@vger.kernel.org This program comes with ABSOLUTELY NO WARRANTY. This is free software, GPL v2 (or any later version) distribution conditions. -; Welcome to lDebug! FreeDOS kernel - GIT (build 2043 OEM:0xfd) [compiled Oct 28 2021] Kernel compatibility 7.10 - GNUC - FAT32 support (C) Copyright 1995-2012 Pasquale J. Villani and The FreeDOS Project. All Rights Reserved. This is free software and comes with ABSOLUTELY NO WARRANTY; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2, or (at your option) any later version. C: HD1, Pri[ 1], CHS= 0-1-1, start= 0 MB, size= 2000 MB D: HD2, Pri[ 1], CHS= 0-1-1, start= 0 MB, size= 2000 MB EMUFS host file and print access available dosemu XMS 3.0 & UMB support enabled dosemu EMS driver rev 0.9 installed. dosemu CDROM driver installed (V0.2) Kernel: allocated 33 Diskbuffers = 17556 Bytes in HMA emufs: redirector enabled emufs: redirector enabled Welcome to dosemu2! Build 2.0pre9-dev-20220422-129-g0470b1a59 -r dco or= 800 -g DPMI entry hooked, new entry=0378:8A76 Protected mode breakpoint at 0211h. 32-bit code segment breakpoint at 0223h. 16-bit stack test breakpoint at 031Bh. 32-bit stack test breakpoint at 0339h. Return from child process at 0450h. Unexpected breakpoint interrupt AX=0200 BX=00E6 CX=0005 DX=000A SP=FFFC BP=0000 SI=070E DI=8A76 DS=2128 ES=3129 SS=2128 CS=2128 IP=01D3 NV UP EI PL ZR NA PE NC 2128:01D3 89E5 mov bp, sp -g 211 Succeeded in unhooking interrupt 2Fh. AX=0001 BX=00E6 CX=0005 DX=000A SP=FFFC BP=FFFC SI=070E DI=8A76 DS=00B7 ES=00BF SS=00B7 CS=0117 IP=0211 NV UP EI PL NZ NA PO NC 0117:0211 8CCB mov bx, cs #t AX=0001 BX=0117 CX=0005 DX=000A SP=FFFC BP=FFFC SI=070E DI=8A76 DS=00B7 ES=00BF SS=00B7 CS=0117 IP=0213 NV UP EI PL NZ NA PO NC 0117:0213 8CC9 mov cx, cs # AX=0001 BX=0117 CX=0117 DX=000A SP=FFFC BP=FFFC SI=070E DI=8A76 DS=00B7 ES=00BF SS=00B7 CS=0117 IP=0215 NV UP EI PL NZ NA PO NC 0117:0215 0F02C9 lar cx, cx # AX=0001 BX=0117 CX=FB00 DX=000A SP=FFFC BP=FFFC SI=070E DI=8A76 DS=00B7 ES=00BF SS=00B7 CS=0117 IP=0218 NV UP EI PL ZR NA PO NC 0117:0218 C1E908 shr cx, 08 # AX=0001 BX=0117 CX=00FB DX=000A SP=FFFC BP=FFFC SI=070E DI=8A76 DS=00B7 ES=00BF SS=00B7 CS=0117 IP=021B NV UP EI PL NZ AC PO NC 0117:021B 80CD40 or ch, 40 # AX=0001 BX=0117 CX=40FB DX=000A SP=FFFC BP=FFFC SI=070E DI=8A76 DS=00B7 ES=00BF SS=00B7 CS=0117 IP=021E NV UP EI PL NZ NA PO NC 0117:021E B80900 mov ax, 0009 # AX=0009 BX=0117 CX=40FB DX=000A SP=FFFC BP=FFFC SI=070E DI=8A76 DS=00B7 ES=00BF SS=00B7 CS=0117 IP=0221 NV UP EI PL NZ NA PO NC 0117:0221 CD31 int 31 # AX=0009 BX=0117 CX=40FB DX=000A SP=FFFC BP=FFFC SI=070E DI=8A76 DS=00B7 ES=00BF SS=00B7 CS=0117 IP=0223 NV UP EI PL NZ NA PO NC 0117:00000223 8C0588040000 mov dword [00000488], es DS:00000488=68430000 # AX=0009 BX=0117 CX=40FB DX=000A SP=FFFC BP=FFFC SI=070E DI=8A76 DS=00B7 ES=00BF SS=00B7 CS=0117 IP=0229 NV UP EI PL NZ NA PO NC 0117:00000229 1E push ds # AX=0009 BX=0117 CX=40FB DX=000A SP=FFF8 BP=FFFC SI=070E DI=8A76 DS=00B7 ES=00BF SS=00B7 CS=0117 IP=022A NV UP EI PL NZ NA PO NC 0117:0000022A 07 pop es # AX=0009 BX=0117 CX=40FB DX=000A SP=FFFC BP=FFFC SI=070E DI=8A76 DS=00B7 ES=00B7 SS=00B7 CS=0117 IP=022B NV UP EI PL NZ NA PO NC 0117:0000022B BE0E070000 mov esi, 0000070E #p AX=0009 BX=0117 CX=40FB DX=000A SP=FFFC BP=FFFC SI=070E DI=8A76 DS=00B7 ES=00B7 SS=00B7 CS=0117 IP=0230 NV UP EI PL NZ NA PO NC 0117:00000230 E815020000 call 0000044A # Welcome in 32-bit protected mode. AX=0200 BX=0117 CX=40FB DX=000A SP=FFFC BP=FFFC SI=0732 DI=8A76 DS=00B7 ES=00B7 SS=00B7 CS=0117 IP=0235 NV UP EI PL ZR NA PE NC 0117:00000235 892570040000 mov [00000470], esp DS:00000470=00000000 #Security warning: native DPMI mode is insecure, adjust $_cpu_vm_dpmi ERROR: KVM: error opening /dev/kvm: No such file or directory ERROR: PKT: Cannot open tap0: Permission denied ERROR: PKT: Cannot open tap0: Permission denied ERROR: alsa_midi (ALSA lib): seq_hw.c:466:(snd_seq_hw_open) : No such file or directory open /dev/snd/seq failed ERROR: MAP_FIXED_NOREPLACE doesn't work ERROR: Unable to open console or check with X to evaluate the keyboard map. Please specify your keyboard map explicitly via the $_layout option. Defaulting to US. ERROR: Fault in dosemu code, in_dpmi=1 ERROR: cpu exception in dosemu code outside of DPMI client! sig: 11 trapno: 0x0e errorcode: 0x00000004 cr2: 0x99da1559 eip: 0x55bb939ed4de esp: 0x7fff074b64c0 eflags: 0x00010217 cs: 0x0033 ds: 0x0000 es: 0x0000 ss: 0x002b fs: 0x0000 gs: 0x0000 fsbase: 0x7fb1696fd7c0 gsbase: (nil) ERROR: Please install gdb, update dosemu from git, compile it with debug info and make a bug report with the content of ~/.dosemu/boot.log at https://github.com/dosemu2/dosemu2/issues Please provide any additional info you can, like the test-cases, URLs and all the rest that fits. ==1816069==WARNING: ASan is ignoring requested __asan_handle_no_return: stack top: 0x000000000000; bottom 0x7fff074b4000; size: 0xffff8000f8b4c000 (-140733315760128) False positive error reports may follow For details see https://github.com/google/sanitizers/issues/189 ERROR: Coopth: not all detached threads properly shut down ERROR: tid=269 state=1 name="msdos ext thr" off=0x7 Terminated with signal 11 dpmitest$