1 /* i386-nlmstub.c -- NLM debugging stub for the i386.
3 This is originally based on an m68k software stub written by Glenn
4 Engel at HP, but has changed quite a bit. It was modified for the
5 i386 by Jim Kingdon, Cygnus Support. It was modified to run under
6 NetWare by Ian Lance Taylor, Cygnus Support.
8 This code is intended to produce an NLM (a NetWare Loadable Module)
9 to run under NetWare on an i386 platform. To create the NLM,
10 compile this code into an object file using the NLM SDK on any i386
11 host, and use the nlmconv program (available in the GNU binutils)
12 to transform the resulting object file into an NLM. */
14 /****************************************************************************
16 THIS SOFTWARE IS NOT COPYRIGHTED
18 HP offers the following for use in the public domain. HP makes no
19 warranty with regard to the software or it's performance and the
20 user accepts the software "AS IS" with all faults.
22 HP DISCLAIMS ANY WARRANTIES, EXPRESS OR IMPLIED, WITH REGARD
23 TO THIS SOFTWARE INCLUDING BUT NOT LIMITED TO THE WARRANTIES
24 OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
26 ****************************************************************************/
28 /****************************************************************************
30 * The following gdb commands are supported:
32 * command function Return value
34 * g return the value of the CPU registers hex data or ENN
35 * G set the value of the CPU registers OK or ENN
37 * mAA..AA,LLLL Read LLLL bytes at address AA..AA hex data or ENN
38 * MAA..AA,LLLL: Write LLLL bytes at address AA.AA OK or ENN
40 * c Resume at current address SNN ( signal NN)
41 * cAA..AA Continue at address AA..AA SNN
43 * s Step one instruction SNN
44 * sAA..AA Step one instruction from AA..AA SNN
48 * ? What was the last sigval ? SNN (signal NN)
50 * All commands and responses are sent with a packet which includes a
51 * checksum. A packet consists of
53 * $<packet info>#<checksum>.
56 * <packet info> :: <characters representing the command or response>
57 * <checksum> :: < two hex digits computed as modulo 256 sum of <packetinfo>>
59 * When a packet is received, it is first acknowledged with either '+' or '-'.
60 * '+' indicates a successful transfer. '-' indicates a failed transfer.
65 * $m0,10#2a +$00010203040506070809101112131415#42
67 ****************************************************************************/
81 /****************************************************/
82 /* This information is from Novell. It is not in any of the standard
83 NetWare header files. */
85 struct DBG_LoadDefinitionStructure
89 LONG LDCodeImageOffset;
90 LONG LDCodeImageLength;
91 LONG LDDataImageOffset;
92 LONG LDDataImageLength;
93 LONG LDUninitializedDataLength;
94 LONG LDCustomDataOffset;
95 LONG LDCustomDataSize;
97 LONG (*LDInitializationProcedure)(void);
100 #define LO_NORMAL 0x0000
101 #define LO_STARTUP 0x0001
102 #define LO_PROTECT 0x0002
103 #define LO_DEBUG 0x0004
104 #define LO_AUTO_LOAD 0x0008
106 /* Loader returned error codes */
107 #define LOAD_COULD_NOT_FIND_FILE 1
108 #define LOAD_ERROR_READING_FILE 2
109 #define LOAD_NOT_NLM_FILE_FORMAT 3
110 #define LOAD_WRONG_NLM_FILE_VERSION 4
111 #define LOAD_REENTRANT_INITIALIZE_FAILURE 5
112 #define LOAD_CAN_NOT_LOAD_MULTIPLE_COPIES 6
113 #define LOAD_ALREADY_IN_PROGRESS 7
114 #define LOAD_NOT_ENOUGH_MEMORY 8
115 #define LOAD_INITIALIZE_FAILURE 9
116 #define LOAD_INCONSISTENT_FILE_FORMAT 10
117 #define LOAD_CAN_NOT_LOAD_AT_STARTUP 11
118 #define LOAD_AUTO_LOAD_MODULES_NOT_LOADED 12
119 #define LOAD_UNRESOLVED_EXTERNAL 13
120 #define LOAD_PUBLIC_ALREADY_DEFINED 14
121 /****************************************************/
123 /* The main thread ID. */
124 static int mainthread;
126 /* The LoadDefinitionStructure of the NLM being debugged. */
127 static struct DBG_LoadDefinitionStructure *handle;
129 /* Whether we have connected to gdb. */
132 /* The actual first instruction in the program. */
133 static unsigned char first_insn;
135 /* An error message for the main thread to print. */
136 static char *error_message;
138 /* The AIO port handle. */
139 static int AIOhandle;
141 /* The console screen. */
142 static int console_screen;
144 /* BUFMAX defines the maximum number of characters in inbound/outbound
145 buffers. At least NUMREGBYTES*2 are needed for register packets */
148 /* remote_debug > 0 prints ill-formed commands in valid packets and
150 static int remote_debug = 1;
152 static const char hexchars[] = "0123456789abcdef";
154 /* Number of bytes of registers. */
155 #define NUMREGBYTES 64
156 enum regnames {EAX, ECX, EDX, EBX, ESP, EBP, ESI, EDI,
157 PC /* also known as eip */,
158 PS /* also known as eflags */,
159 CS, SS, DS, ES, FS, GS};
161 /* Register values. */
162 static int registers[NUMREGBYTES/4];
164 /* Read a character from the serial port. This must busy wait, but
165 that's OK because we will be the only thread running anyhow. */
176 err = AIOReadData (AIOhandle, (char *) &ret, 1, &got);
179 error_message = "AIOReadData failed";
180 ResumeThread (mainthread);
189 /* Write a character to the serial port. Returns 0 on failure,
190 non-zero on success. */
199 err = AIOWriteData (AIOhandle, (char *) &c, 1, &put);
200 if (err != 0 || put != 1)
202 error_message = "AIOWriteData failed";
203 ResumeThread (mainthread);
209 /* Get the registers out of the frame information. */
212 frame_to_registers (frame, regs)
213 T_TSS_StackFrame *frame;
216 regs[EAX] = frame->ExceptionEAX;
217 regs[ECX] = frame->ExceptionECX;
218 regs[EDX] = frame->ExceptionEDX;
219 regs[EBX] = frame->ExceptionEBX;
220 regs[ESP] = frame->ExceptionESP;
221 regs[EBP] = frame->ExceptionEBP;
222 regs[ESI] = frame->ExceptionESI;
223 regs[EDI] = frame->ExceptionEDI;
224 regs[PC] = frame->ExceptionEIP;
225 regs[PS] = frame->ExceptionSystemFlags;
226 regs[CS] = frame->ExceptionCS[0];
227 regs[SS] = frame->ExceptionSS[0];
228 regs[DS] = frame->ExceptionDS[0];
229 regs[ES] = frame->ExceptionES[0];
230 regs[FS] = frame->ExceptionFS[0];
231 regs[GS] = frame->ExceptionGS[0];
234 /* Put the registers back into the frame information. */
237 registers_to_frame (regs, frame)
239 T_TSS_StackFrame *frame;
241 frame->ExceptionEAX = regs[EAX];
242 frame->ExceptionECX = regs[ECX];
243 frame->ExceptionEDX = regs[EDX];
244 frame->ExceptionEBX = regs[EBX];
245 frame->ExceptionESP = regs[ESP];
246 frame->ExceptionEBP = regs[EBP];
247 frame->ExceptionESI = regs[ESI];
248 frame->ExceptionEDI = regs[EDI];
249 frame->ExceptionEIP = regs[PC];
250 frame->ExceptionSystemFlags = regs[PS];
251 frame->ExceptionCS[0] = regs[CS];
252 frame->ExceptionSS[0] = regs[SS];
253 frame->ExceptionDS[0] = regs[DS];
254 frame->ExceptionES[0] = regs[ES];
255 frame->ExceptionFS[0] = regs[FS];
256 frame->ExceptionGS[0] = regs[GS];
259 /* Turn a hex character into a number. */
265 if ((ch >= 'a') && (ch <= 'f'))
267 if ((ch >= '0') && (ch <= '9'))
269 if ((ch >= 'A') && (ch <= 'F'))
274 /* Scan for the sequence $<data>#<checksum>. Returns 0 on failure,
275 non-zero on success. */
281 unsigned char checksum;
282 unsigned char xmitcsum;
289 /* wait around for the start character, ignore all other characters */
290 while ((ch = getDebugChar()) != '$')
298 /* now, read until a # or end of buffer is found */
299 while (count < BUFMAX)
306 checksum = checksum + ch;
314 ch = getDebugChar ();
317 xmitcsum = hex(ch) << 4;
318 ch = getDebugChar ();
322 if ((remote_debug ) && (checksum != xmitcsum))
324 fprintf_unfiltered(gdb_stderr,"bad checksum. My count = 0x%x, sent=0x%x. buf=%s\n",
325 checksum,xmitcsum,buffer);
328 if (checksum != xmitcsum)
330 /* failed checksum */
331 if (! putDebugChar('-'))
336 /* successful transfer */
337 if (! putDebugChar('+'))
339 /* if a sequence char is present, reply the sequence ID */
340 if (buffer[2] == ':')
342 if (! putDebugChar (buffer[0])
343 || ! putDebugChar (buffer[1]))
345 /* remove sequence chars from buffer */
346 count = strlen(buffer);
347 for (i=3; i <= count; i++)
348 buffer[i-3] = buffer[i];
353 while (checksum != xmitcsum);
356 ConsolePrintf ("Received packet \"%s\"\r\n", buffer);
361 /* Send the packet in buffer. Returns 0 on failure, non-zero on
368 unsigned char checksum;
373 ConsolePrintf ("Sending packet \"%s\"\r\n", buffer);
375 /* $<packet info>#<checksum>. */
378 if (! putDebugChar('$'))
383 while (ch=buffer[count])
385 if (! putDebugChar(ch))
391 if (! putDebugChar('#')
392 || ! putDebugChar(hexchars[checksum >> 4])
393 || ! putDebugChar(hexchars[checksum % 16]))
396 ch = getDebugChar ();
405 static char remcomInBuffer[BUFMAX];
406 static char remcomOutBuffer[BUFMAX];
410 debug_error (format, parm)
416 fprintf_unfiltered (gdb_stderr, format, parm);
417 fprintf_unfiltered (gdb_stderr, "\n");
421 /* This is set if we could get a memory access fault. */
422 static int mem_may_fault;
424 /* Indicate to caller of mem2hex or hex2mem that there has been an
426 static volatile int mem_err = 0;
428 /* These are separate functions so that they are so short and sweet
429 that the compiler won't save any registers (if there is a fault
430 to mem_fault, they won't get restored, so there better not be any
448 /* This bit of assembly language just returns from a function. If a
449 memory error occurs within get_char or set_char, the debugger
450 handler points EIP at these instructions to get out. */
452 extern void just_return ();
453 asm (".globl just_return");
454 asm (".globl _just_return");
455 asm ("just_return:");
456 asm ("_just_return:");
460 /* convert the memory pointed to by mem into hex, placing result in buf */
461 /* return a pointer to the last char put in buf (null) */
462 /* If MAY_FAULT is non-zero, then we should set mem_err in response to
463 a fault; if zero treat a fault like any other fault in the stub. */
466 mem2hex (mem, buf, count, may_fault)
475 mem_may_fault = may_fault;
476 for (i = 0; i < count; i++)
478 ch = get_char (mem++);
479 if (may_fault && mem_err)
481 *buf++ = hexchars[ch >> 4];
482 *buf++ = hexchars[ch % 16];
489 /* convert the hex array pointed to by buf into binary to be placed in mem */
490 /* return a pointer to the character AFTER the last byte written */
493 hex2mem (buf, mem, count, may_fault)
502 mem_may_fault = may_fault;
503 for (i=0;i<count;i++)
505 ch = hex(*buf++) << 4;
506 ch = ch + hex(*buf++);
507 set_char (mem++, ch);
508 if (may_fault && mem_err)
515 /* This function takes the 386 exception vector and attempts to
516 translate this number into a unix compatible signal value. */
519 computeSignal (exceptionVector)
523 switch (exceptionVector)
525 case 0 : sigval = 8; break; /* divide by zero */
526 case 1 : sigval = 5; break; /* debug exception */
527 case 3 : sigval = 5; break; /* breakpoint */
528 case 4 : sigval = 16; break; /* into instruction (overflow) */
529 case 5 : sigval = 16; break; /* bound instruction */
530 case 6 : sigval = 4; break; /* Invalid opcode */
531 case 7 : sigval = 8; break; /* coprocessor not available */
532 case 8 : sigval = 7; break; /* double fault */
533 case 9 : sigval = 11; break; /* coprocessor segment overrun */
534 case 10 : sigval = 11; break; /* Invalid TSS */
535 case 11 : sigval = 11; break; /* Segment not present */
536 case 12 : sigval = 11; break; /* stack exception */
537 case 13 : sigval = 11; break; /* general protection */
538 case 14 : sigval = 11; break; /* page fault */
539 case 16 : sigval = 7; break; /* coprocessor error */
541 sigval = 7; /* "software generated"*/
546 /**********************************************/
547 /* WHILE WE FIND NICE HEX CHARS, BUILD AN INT */
548 /* RETURN NUMBER OF CHARS PROCESSED */
549 /**********************************************/
551 hexToInt(ptr, intValue)
562 hexValue = hex(**ptr);
565 *intValue = (*intValue <<4) | hexValue;
577 /* This function does all command processing for interfacing to gdb.
578 It is called whenever an exception occurs in the module being
582 handle_exception (T_StackFrame *old_frame)
584 T_TSS_StackFrame *frame = (T_TSS_StackFrame *) old_frame;
590 /* Apparently the bell can sometimes be ringing at this point, and
591 should be stopped. */
596 ConsolePrintf ("vector=%d: %s, sr=0x%x, pc=0x%x, thread=%d\r\n",
597 frame->ExceptionNumber,
598 frame->ExceptionDescription,
599 frame->ExceptionSystemFlags,
604 /* If the NLM just started, we record the module load information
605 and the thread ID, and set a breakpoint at the first instruction
607 if (frame->ExceptionNumber == START_NLM_EVENT
610 handle = ((struct DBG_LoadDefinitionStructure *)
611 frame->ExceptionErrorCode);
612 first_insn = *(char *) handle->LDInitializationProcedure;
613 *(unsigned char *) handle->LDInitializationProcedure = 0xcc;
614 return RETURN_TO_PROGRAM;
617 /* After we've reached the initial breakpoint, reset it. */
618 if (frame->ExceptionEIP == (LONG) handle->LDInitializationProcedure + 1
619 && *(unsigned char *) handle->LDInitializationProcedure == 0xcc)
621 *(char *) handle->LDInitializationProcedure = first_insn;
622 frame->ExceptionEIP = (LONG) handle->LDInitializationProcedure;
625 /* Pass some events on to the next debugger, in case it will handle
627 if (frame->ExceptionNumber == ENTER_DEBUGGER_EVENT
628 || frame->ExceptionNumber == KEYBOARD_BREAK_EVENT)
629 return RETURN_TO_NEXT_DEBUGGER;
631 /* At the moment, we don't care about most of the unusual NetWare
633 if (frame->ExceptionNumber != TERMINATE_NLM_EVENT
634 && frame->ExceptionNumber > 31)
635 return RETURN_TO_PROGRAM;
637 /* If we get a GP fault, and mem_may_fault is set, and the
638 instruction pointer is near set_char or get_char, then we caused
639 the fault ourselves accessing an illegal memory location. */
641 && (frame->ExceptionNumber == 11
642 || frame->ExceptionNumber == 13
643 || frame->ExceptionNumber == 14)
644 && ((frame->ExceptionEIP >= (long) &set_char
645 && frame->ExceptionEIP < (long) &set_char + 50)
646 || (frame->ExceptionEIP >= (long) &get_char
647 && frame->ExceptionEIP < (long) &get_char + 50)))
650 /* Point the instruction pointer at an assembly language stub
651 which just returns from the function. */
652 frame->ExceptionEIP = (long) &just_return;
653 /* Keep going. This will act as though it returned from
654 set_char or get_char. The calling routine will check
655 mem_err, and do the right thing. */
656 return RETURN_TO_PROGRAM;
659 /* FIXME: How do we know that this exception has anything to do with
660 the program we are debugging? We can check whether the PC is in
661 the range of the module we are debugging, but that doesn't help
662 much since an error could occur in a library routine. */
664 frame_to_registers (frame, registers);
666 /* reply to host that an exception has occurred */
667 if (frame->ExceptionNumber == TERMINATE_NLM_EVENT)
669 /* There is no way to get the exit status. */
670 remcomOutBuffer[0] = 'W';
671 remcomOutBuffer[1] = hexchars[0];
672 remcomOutBuffer[2] = hexchars[0];
673 remcomOutBuffer[3] = 0;
677 sigval = computeSignal (frame->ExceptionNumber);
678 remcomOutBuffer[0] = 'N';
679 remcomOutBuffer[1] = hexchars[sigval >> 4];
680 remcomOutBuffer[2] = hexchars[sigval % 16];
681 sprintf (remcomOutBuffer + 3, "0x%x;0x%x;0x%x",
682 handle->LDCodeImageOffset,
683 handle->LDDataImageOffset,
684 handle->LDDataImageOffset + handle->LDDataImageLength);
687 if (! putpacket(remcomOutBuffer))
688 return RETURN_TO_NEXT_DEBUGGER;
690 if (frame->ExceptionNumber == TERMINATE_NLM_EVENT)
692 ResumeThread (mainthread);
693 return RETURN_TO_PROGRAM;
699 remcomOutBuffer[0] = 0;
700 if (! getpacket (remcomInBuffer))
701 return RETURN_TO_NEXT_DEBUGGER;
703 switch (remcomInBuffer[0])
706 sigval = computeSignal (frame->ExceptionNumber);
707 remcomOutBuffer[0] = 'N';
708 remcomOutBuffer[1] = hexchars[sigval >> 4];
709 remcomOutBuffer[2] = hexchars[sigval % 16];
710 sprintf (remcomOutBuffer + 3, "0x%x;0x%x;0x%x",
711 handle->LDCodeImageOffset,
712 handle->LDDataImageOffset,
713 handle->LDDataImageOffset + handle->LDDataImageLength);
716 remote_debug = !(remote_debug); /* toggle debug flag */
719 /* return the value of the CPU registers */
720 mem2hex((char*) registers, remcomOutBuffer, NUMREGBYTES, 0);
723 /* set the value of the CPU registers - return OK */
724 hex2mem(&remcomInBuffer[1], (char*) registers, NUMREGBYTES, 0);
725 strcpy(remcomOutBuffer,"OK");
729 /* mAA..AA,LLLL Read LLLL bytes at address AA..AA */
730 /* TRY TO READ %x,%x. IF SUCCEED, SET PTR = 0 */
731 ptr = &remcomInBuffer[1];
732 if (hexToInt(&ptr,&addr))
734 if (hexToInt(&ptr,&length))
738 mem2hex((char*) addr, remcomOutBuffer, length, 1);
741 strcpy (remcomOutBuffer, "E03");
742 debug_error ("memory fault");
748 strcpy(remcomOutBuffer,"E01");
749 debug_error("malformed read memory command: %s",remcomInBuffer);
754 /* MAA..AA,LLLL: Write LLLL bytes at address AA.AA return OK */
755 /* TRY TO READ '%x,%x:'. IF SUCCEED, SET PTR = 0 */
756 ptr = &remcomInBuffer[1];
757 if (hexToInt(&ptr,&addr))
759 if (hexToInt(&ptr,&length))
763 hex2mem(ptr, (char*) addr, length, 1);
767 strcpy (remcomOutBuffer, "E03");
768 debug_error ("memory fault");
772 strcpy(remcomOutBuffer,"OK");
779 strcpy(remcomOutBuffer,"E02");
780 debug_error("malformed write memory command: %s",remcomInBuffer);
786 /* cAA..AA Continue at address AA..AA(optional) */
787 /* sAA..AA Step one instruction from AA..AA(optional) */
788 /* try to read optional parameter, pc unchanged if no parm */
789 ptr = &remcomInBuffer[1];
790 if (hexToInt(&ptr,&addr))
791 registers[ PC ] = addr;
793 newPC = registers[ PC];
795 /* clear the trace bit */
796 registers[ PS ] &= 0xfffffeff;
798 /* set the trace bit if we're stepping */
799 if (remcomInBuffer[0] == 's') registers[ PS ] |= 0x100;
801 registers_to_frame (registers, frame);
802 return RETURN_TO_PROGRAM;
805 /* kill the program */
807 ResumeThread (mainthread);
808 return RETURN_TO_PROGRAM;
811 /* reply to the request */
812 if (! putpacket(remcomOutBuffer))
813 return RETURN_TO_NEXT_DEBUGGER;
817 /* Start up. The main thread opens the named serial I/O port, loads
818 the named NLM module and then goes to sleep. The serial I/O port
819 is named as a board number and a port number. It would be more DOS
820 like to provide a menu of available serial ports, but I don't want
821 to have to figure out how to do that. */
828 int hardware, board, port;
830 struct debuggerStructure s;
834 /* Create a screen for the debugger. */
835 console_screen = CreateScreen ("System Console", 0);
836 if (DisplayScreen (console_screen) != ESUCCESS)
837 fprintf_unfiltered (gdb_stderr, "DisplayScreen failed\n");
841 fprintf_unfiltered (gdb_stderr,
842 "Usage: load gdbserver board port program [arguments]\n");
847 board = strtol (argv[1], (char **) NULL, 0);
848 port = strtol (argv[2], (char **) NULL, 0);
850 err = AIOAcquirePort (&hardware, &board, &port, &AIOhandle);
851 if (err != AIO_SUCCESS)
855 case AIO_PORT_NOT_AVAILABLE:
856 fprintf_unfiltered (gdb_stderr, "Port not available\n");
859 case AIO_BOARD_NUMBER_INVALID:
860 case AIO_PORT_NUMBER_INVALID:
861 fprintf_unfiltered (gdb_stderr, "No such port\n");
865 fprintf_unfiltered (gdb_stderr, "Could not open port: %d\n", err);
872 err = AIOConfigurePort (AIOhandle, AIO_BAUD_9600, AIO_DATA_BITS_8,
873 AIO_STOP_BITS_1, AIO_PARITY_NONE,
874 AIO_HARDWARE_FLOW_CONTROL_OFF);
875 if (err != AIO_SUCCESS)
877 fprintf_unfiltered (gdb_stderr, "Could not configure port: %d\n", err);
878 AIOReleasePort (AIOhandle);
882 /* Register ourselves as an alternate debugger. */
883 memset (&s, 0, sizeof s);
884 s.DDSResourceTag = ((struct ResourceTagStructure *)
885 AllocateResourceTag (GetNLMHandle (),
888 if (s.DDSResourceTag == 0)
890 fprintf_unfiltered (gdb_stderr, "AllocateResourceTag failed\n");
891 AIOReleasePort (AIOhandle);
894 s.DDSdebuggerEntry = handle_exception;
895 s.DDSFlags = TSS_FRAME_BIT;
897 err = RegisterDebuggerRTag (&s, AT_FIRST);
900 fprintf_unfiltered (gdb_stderr, "RegisterDebuggerRTag failed\n");
901 AIOReleasePort (AIOhandle);
905 /* Get the command line we were invoked with, and advance it past
906 our name and the board and port arguments. */
907 cmdlin = getcmd ((char *) NULL);
908 for (i = 0; i < 2; i++)
910 while (! isspace (*cmdlin))
912 while (isspace (*cmdlin))
916 /* In case GDB is started before us, ack any packets (presumably
917 "$?#xx") sitting there. */
918 if (! putDebugChar ('+'))
920 fprintf_unfiltered (gdb_stderr, "putDebugChar failed\n");
921 UnRegisterDebugger (&s);
922 AIOReleasePort (AIOhandle);
926 mainthread = GetThreadID ();
930 if (remote_debug > 0)
931 ConsolePrintf ("About to call LoadModule with \"%s\" %d %d\r\n",
932 cmdlin, console_screen, __GetScreenID (console_screen));
934 /* Start up the module to be debugged. */
935 err = LoadModule ((struct ScreenStruct *) __GetScreenID (console_screen),
939 fprintf_unfiltered (gdb_stderr, "LoadModule failed: %d\n", err);
940 UnRegisterDebugger (&s);
941 AIOReleasePort (AIOhandle);
945 /* Wait for the debugger to wake us up. */
946 if (remote_debug > 0)
947 ConsolePrintf ("Suspending main thread (%d)\r\n", mainthread);
948 SuspendThread (mainthread);
949 if (remote_debug > 0)
950 ConsolePrintf ("Resuming main thread (%d)\r\n", mainthread);
952 /* If we are woken up, print an optional error message, deregister
953 ourselves and exit. */
954 if (error_message != NULL)
955 fprintf_unfiltered (gdb_stderr, "%s\n", error_message);
956 UnRegisterDebugger (&s);
957 AIOReleasePort (AIOhandle);