dpmitest$ ~/local.new/bin/dosemu -K "$PWD" -dumb -E "ldebugx.com /c='r dco or= 800;g' dpmistck.com" -I "cpu_vm_dpmi native" -I "serial { com 2 device /tmp/vptty-dos }" -td -kt -D9+M dosemu2 2.0pre9-dev-20220423-131-gdb595c7ea Configured: 2022-04-23 12:48:01 +0000 Get the latest code at http://dosemu2.github.io/dosemu2 Submit Bugs via https://github.com/dosemu2/dosemu2/issues Ask for help in mail list: linux-msdos@vger.kernel.org This program comes with ABSOLUTELY NO WARRANTY. This is free software, GPL v2 (or any later version) distribution conditions. -; Welcome to lDebug! FreeDOS kernel - GIT (build 2043 OEM:0xfd) [compiled Oct 28 2021] Kernel compatibility 7.10 - GNUC - FAT32 support (C) Copyright 1995-2012 Pasquale J. Villani and The FreeDOS Project. All Rights Reserved. This is free software and comes with ABSOLUTELY NO WARRANTY; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2, or (at your option) any later version. C: HD1, Pri[ 1], CHS= 0-1-1, start= 0 MB, size= 2000 MB D: HD2, Pri[ 1], CHS= 0-1-1, start= 0 MB, size= 2000 MB EMUFS host file and print access available dosemu XMS 3.0 & UMB support enabled dosemu EMS driver rev 0.9 installed. dosemu CDROM driver installed (V0.2) Kernel: allocated 33 Diskbuffers = 17556 Bytes in HMA emufs: redirector enabled emufs: redirector enabled Welcome to dosemu2! Build 2.0pre9-dev-20220423-131-gdb595c7ea -r dco or= 800 -g DPMI entry hooked, new entry=0378:8A76 Protected mode breakpoint at 0211h. 32-bit code segment breakpoint at 0223h. 16-bit stack test breakpoint at 031Bh. 32-bit stack test breakpoint at 0339h. Return from child process at 0450h. Unexpected breakpoint interrupt AX=0200 BX=00E6 CX=0005 DX=000A SP=FFFC BP=0000 SI=070E DI=8A76 DS=212E ES=312F SS=212E CS=212E IP=01D3 NV UP EI PL ZR NA PE NC 212E:01D3 89E5 mov bp, sp -?build lDebugX (2022-04-23) Source Control Revision ID: hg 8b922d9f2d4e+ (2697 ancestors) Uses lmacros: Revision ID hg 9fa0e64034cd (150 ancestors) Uses scanptab: Revision ID hg 0e53081c1531 (10 ancestors) Uses inicomp: Revision ID hg 643100de3694 (532 ancestors) Uses ldosboot: Revision ID hg 0d54fe4aaa06 (571 ancestors) -g 211 Succeeded in unhooking interrupt 2Fh. AX=0001 BX=00E6 CX=0005 DX=000A SP=FFFC BP=FFFC SI=070E DI=8A76 DS=00B7 ES=00BF SS=00B7 CS=0117 IP=0211 NV UP EI PL NZ NA PO NC 0117:0211 8CCB mov bx, cs #t10 AX=0001 BX=0117 CX=0005 DX=000A SP=FFFC BP=FFFC SI=070E DI=8A76 DS=00B7 ES=00BF SS=00B7 CS=0117 IP=0213 NV UP EI PL NZ NA PO NC 0117:0213 8CC9 mov cx, cs AX=0001 BX=0117 CX=0117 DX=000A SP=FFFC BP=FFFC SI=070E DI=8A76 DS=00B7 ES=00BF SS=00B7 CS=0117 IP=0215 NV UP EI PL NZ NA PO NC 0117:0215 0F02C9 lar cx, cx AX=0001 BX=0117 CX=FB00 DX=000A SP=FFFC BP=FFFC SI=070E DI=8A76 DS=00B7 ES=00BF SS=00B7 CS=0117 IP=0218 NV UP EI PL ZR NA PO NC 0117:0218 C1E908 shr cx, 08 AX=0001 BX=0117 CX=00FB DX=000A SP=FFFC BP=FFFC SI=070E DI=8A76 DS=00B7 ES=00BF SS=00B7 CS=0117 IP=021B NV UP EI PL NZ AC PO NC 0117:021B 80CD40 or ch, 40 AX=0001 BX=0117 CX=40FB DX=000A SP=FFFC BP=FFFC SI=070E DI=8A76 DS=00B7 ES=00BF SS=00B7 CS=0117 IP=021E NV UP EI PL NZ NA PO NC 0117:021E B80900 mov ax, 0009 AX=0009 BX=0117 CX=40FB DX=000A SP=FFFC BP=FFFC SI=070E DI=8A76 DS=00B7 ES=00BF SS=00B7 CS=0117 IP=0221 NV UP EI PL NZ NA PO NC 0117:0221 CD31 int 31 AX=0009 BX=0117 CX=40FB DX=000A SP=FFFC BP=FFFC SI=070E DI=8A76 DS=00B7 ES=00BF SS=00B7 CS=0117 IP=0223 NV UP EI PL NZ NA PO NC 0117:00000223 8C0588040000 mov dword [00000488], es DS:00000488=68430000 AX=0009 BX=0117 CX=40FB DX=000A SP=FFFC BP=FFFC SI=070E DI=8A76 DS=00B7 ES=00BF SS=00B7 CS=0117 IP=0229 NV UP EI PL NZ NA PO NC 0117:00000229 1E push ds AX=0009 BX=0117 CX=40FB DX=000A SP=FFF8 BP=FFFC SI=070E DI=8A76 DS=00B7 ES=00BF SS=00B7 CS=0117 IP=022A NV UP EI PL NZ NA PO NC 0117:0000022A 07 pop es AX=0009 BX=0117 CX=40FB DX=000A SP=FFFC BP=FFFC SI=070E DI=8A76 DS=00B7 ES=00B7 SS=00B7 CS=0117 IP=022B NV UP EI PL NZ NA PO NC 0117:0000022B BE0E070000 mov esi, 0000070E AX=0009 BX=0117 CX=40FB DX=000A SP=FFFC BP=FFFC SI=070E DI=8A76 DS=00B7 ES=00B7 SS=00B7 CS=0117 IP=0230 NV UP EI PL NZ NA PO NC 0117:00000230 E815020000 call 0000044A AX=0009 BX=0117 CX=40FB DX=000A SP=FFF8 BP=FFFC SI=070E DI=8A76 DS=00B7 ES=00B7 SS=00B7 CS=0117 IP=044A NV UP EI PL NZ NA PO NC 0117:0000044A AC lodsb AX=0057 BX=0117 CX=40FB DX=000A SP=FFF8 BP=FFFC SI=070F DI=8A76 DS=00B7 ES=00B7 SS=00B7 CS=0117 IP=044B NV UP EI PL NZ NA PO NC 0117:0000044B 84C0 test al, al AX=0057 BX=0117 CX=40FB DX=000A SP=FFF8 BP=FFFC SI=070F DI=8A76 DS=00B7 ES=00B7 SS=00B7 CS=0117 IP=044D NV UP EI PL NZ NA PO NC 0117:0000044D 75F5 jnz 00000444 jumping AX=0057 BX=0117 CX=40FB DX=000A SP=FFF8 BP=FFFC SI=070F DI=8A76 DS=00B7 ES=00B7 SS=00B7 CS=0117 IP=0444 NV UP EI PL NZ NA PO NC 0117:00000444 88C2 mov dl, al AX=0057 BX=0117 CX=40FB DX=0057 SP=FFF8 BP=FFFC SI=070F DI=8A76 DS=00B7 ES=00B7 SS=00B7 CS=0117 IP=0446 NV UP EI PL NZ NA PO NC 0117:00000446 B402 mov ah, 02 #q Security warning: native DPMI mode is insecure, adjust $_cpu_vm_dpmi ERROR: KVM: error opening /dev/kvm: No such file or directory ERROR: PKT: Cannot open tap0: Permission denied ERROR: PKT: Cannot open tap0: Permission denied ERROR: alsa_midi (ALSA lib): seq_hw.c:466:(snd_seq_hw_open) : No such file or directory open /dev/snd/seq failed ERROR: MAP_FIXED_NOREPLACE doesn't work ERROR: Unable to open console or check with X to evaluate the keyboard map. Please specify your keyboard map explicitly via the $_layout option. Defaulting to US. ERROR: Fault in dosemu code, in_dpmi=0 ERROR: cpu exception in dosemu code outside of VM86()! sig: 11 trapno: 0x0e errorcode: 0x00000004 cr2: 0x02469c51 eip: 0x555e8d3fa2b1 esp: 0x7ffecdcf5140 eflags: 0x00010246 cs: 0x0033 ds: 0x0000 es: 0x0000 ss: 0x002b fs: 0x0000 gs: 0x0000 fsbase: 0x7ff91338e7c0 gsbase: (nil) ERROR: Please install gdb, update dosemu from git, compile it with debug info and make a bug report with the content of ~/.dosemu/boot.log at https://github.com/dosemu2/dosemu2/issues Please provide any additional info you can, like the test-cases, URLs and all the rest that fits. ==1025526==WARNING: ASan is ignoring requested __asan_handle_no_return: stack top: 0x000000000000; bottom 0x7ffecdcf3000; size: 0xffff80013230d000 (-140732351328256) False positive error reports may follow For details see https://github.com/google/sanitizers/issues/189 Terminated with signal 11 dpmitest$