1 /* Native support for the SGI Iris running IRIX version 5, for GDB.
2 Copyright 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995
3 Free Software Foundation, Inc.
6 Implemented for Irix 4.x by Garrett A. Wollman.
7 Modified for Irix 5.x by Ian Lance Taylor.
9 This file is part of GDB.
11 This program is free software; you can redistribute it and/or modify
12 it under the terms of the GNU General Public License as published by
13 the Free Software Foundation; either version 2 of the License, or
14 (at your option) any later version.
16 This program is distributed in the hope that it will be useful,
17 but WITHOUT ANY WARRANTY; without even the implied warranty of
18 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 GNU General Public License for more details.
21 You should have received a copy of the GNU General Public License
22 along with this program; if not, write to the Free Software
23 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
30 #include "gdb_string.h"
32 #include <sys/procfs.h>
33 #include <setjmp.h> /* For JB_XXX. */
35 /* Size of elements in jmpbuf */
37 #define JB_ELEMENT_SIZE 4
40 * See the comment in m68k-tdep.c regarding the utility of these functions.
42 * These definitions are from the MIPS SVR4 ABI, so they may work for
43 * any MIPS SVR4 target.
47 supply_gregset (gregsetp)
51 register greg_t *regp = &(*gregsetp)[0];
52 static char zerobuf[MAX_REGISTER_RAW_SIZE] = {0};
54 for(regi = 0; regi <= CTX_RA; regi++)
55 supply_register (regi, (char *)(regp + regi));
57 supply_register (PC_REGNUM, (char *)(regp + CTX_EPC));
58 supply_register (HI_REGNUM, (char *)(regp + CTX_MDHI));
59 supply_register (LO_REGNUM, (char *)(regp + CTX_MDLO));
60 supply_register (CAUSE_REGNUM, (char *)(regp + CTX_CAUSE));
62 /* Fill inaccessible registers with zero. */
63 supply_register (BADVADDR_REGNUM, zerobuf);
67 fill_gregset (gregsetp, regno)
72 register greg_t *regp = &(*gregsetp)[0];
74 for (regi = 0; regi <= CTX_RA; regi++)
75 if ((regno == -1) || (regno == regi))
76 *(regp + regi) = *(greg_t *) ®isters[REGISTER_BYTE (regi)];
78 if ((regno == -1) || (regno == PC_REGNUM))
79 *(regp + CTX_EPC) = *(greg_t *) ®isters[REGISTER_BYTE (PC_REGNUM)];
81 if ((regno == -1) || (regno == CAUSE_REGNUM))
82 *(regp + CTX_CAUSE) = *(greg_t *) ®isters[REGISTER_BYTE (CAUSE_REGNUM)];
84 if ((regno == -1) || (regno == HI_REGNUM))
85 *(regp + CTX_MDHI) = *(greg_t *) ®isters[REGISTER_BYTE (HI_REGNUM)];
87 if ((regno == -1) || (regno == LO_REGNUM))
88 *(regp + CTX_MDLO) = *(greg_t *) ®isters[REGISTER_BYTE (LO_REGNUM)];
92 * Now we do the same thing for floating-point registers.
93 * We don't bother to condition on FP0_REGNUM since any
94 * reasonable MIPS configuration has an R3010 in it.
96 * Again, see the comments in m68k-tdep.c.
100 supply_fpregset (fpregsetp)
101 fpregset_t *fpregsetp;
104 static char zerobuf[MAX_REGISTER_RAW_SIZE] = {0};
106 for (regi = 0; regi < 32; regi++)
107 supply_register (FP0_REGNUM + regi,
108 (char *)&fpregsetp->fp_r.fp_regs[regi]);
110 supply_register (FCRCS_REGNUM, (char *)&fpregsetp->fp_csr);
112 /* FIXME: how can we supply FCRIR_REGNUM? SGI doesn't tell us. */
113 supply_register (FCRIR_REGNUM, zerobuf);
117 fill_fpregset (fpregsetp, regno)
118 fpregset_t *fpregsetp;
124 for (regi = FP0_REGNUM; regi < FP0_REGNUM + 32; regi++)
126 if ((regno == -1) || (regno == regi))
128 from = (char *) ®isters[REGISTER_BYTE (regi)];
129 to = (char *) &(fpregsetp->fp_r.fp_regs[regi - FP0_REGNUM]);
130 memcpy(to, from, REGISTER_RAW_SIZE (regi));
134 if ((regno == -1) || (regno == FCRCS_REGNUM))
135 fpregsetp->fp_csr = *(unsigned *) ®isters[REGISTER_BYTE(FCRCS_REGNUM)];
139 /* Figure out where the longjmp will land.
140 We expect the first arg to be a pointer to the jmp_buf structure from which
141 we extract the pc (JB_PC) that we will land at. The pc is copied into PC.
142 This routine returns true on success. */
145 get_longjmp_target (pc)
148 char buf[TARGET_PTR_BIT / TARGET_CHAR_BIT];
151 jb_addr = read_register (A0_REGNUM);
153 if (target_read_memory (jb_addr + JB_PC * JB_ELEMENT_SIZE, buf,
154 TARGET_PTR_BIT / TARGET_CHAR_BIT))
157 *pc = extract_address (buf, TARGET_PTR_BIT / TARGET_CHAR_BIT);
163 fetch_core_registers (core_reg_sect, core_reg_size, which, reg_addr)
165 unsigned core_reg_size;
166 int which; /* Unused */
167 unsigned int reg_addr; /* Unused */
169 if (core_reg_size != REGISTER_BYTES)
171 warning ("wrong size gregset struct in core file");
175 memcpy ((char *)registers, core_reg_sect, core_reg_size);
178 /* Irix 5 uses what appears to be a unique form of shared library
179 support. This is a copy of solib.c modified for Irix 5. */
181 #include <sys/types.h>
183 #include <sys/param.h>
186 /* <obj.h> includes <sym.h> and <symconst.h>, which causes conflicts
187 with our versions of those files included by tm-mips.h. Prevent
188 <obj.h> from including them with some appropriate defines. */
190 #define __SYMCONST_H__
196 #include "objfiles.h"
200 #include "inferior.h"
201 #include "language.h"
203 /* The symbol which starts off the list of shared libraries. */
204 #define DEBUG_BASE "__rld_obj_head"
206 /* How to get the loaded address of a shared library. */
207 #define LM_ADDR(so) ((so)->lm.o_praw)
209 char shadow_contents[BREAKPOINT_MAX]; /* Stash old bkpt addr contents */
212 struct so_list *next; /* next structure in linked list */
214 struct obj lm; /* copy of link map from inferior */
215 struct obj_list *lladdr; /* addr in inferior lm was read from */
216 CORE_ADDR lmend; /* upper addr bound of mapped object */
217 char symbols_loaded; /* flag: symbols read in yet? */
218 char from_tty; /* flag: print msgs? */
219 struct objfile *objfile; /* objfile for loaded lib */
220 struct section_table *sections;
221 struct section_table *sections_end;
222 struct section_table *textsection;
226 static struct so_list *so_list_head; /* List of known shared objects */
227 static CORE_ADDR debug_base; /* Base of dynamic linker structures */
228 static CORE_ADDR breakpoint_addr; /* Address where end bkpt is set */
230 /* Local function prototypes */
233 sharedlibrary_command PARAMS ((char *, int));
236 enable_break PARAMS ((void));
239 disable_break PARAMS ((void));
242 info_sharedlibrary_command PARAMS ((char *, int));
245 symbol_add_stub PARAMS ((char *));
247 static struct so_list *
248 find_solib PARAMS ((struct so_list *));
250 static struct obj_list *
251 first_link_map_member PARAMS ((void));
254 locate_base PARAMS ((void));
257 solib_map_sections PARAMS ((struct so_list *));
263 solib_map_sections -- open bfd and build sections for shared lib
267 static void solib_map_sections (struct so_list *so)
271 Given a pointer to one of the shared objects in our list
272 of mapped objects, use the recorded name to open a bfd
273 descriptor for the object, build a section table, and then
274 relocate all the section addresses by the base address at
275 which the shared object was mapped.
279 In most (all?) cases the shared object file name recorded in the
280 dynamic linkage tables will be a fully qualified pathname. For
281 cases where it isn't, do we really mimic the systems search
282 mechanism correctly in the below code (particularly the tilde
287 solib_map_sections (so)
291 char *scratch_pathname;
293 struct section_table *p;
294 struct cleanup *old_chain;
298 filename = tilde_expand (so -> lm.o_path);
299 old_chain = make_cleanup (free, filename);
301 scratch_chan = openp (getenv ("PATH"), 1, filename, O_RDONLY, 0,
303 if (scratch_chan < 0)
305 scratch_chan = openp (getenv ("LD_LIBRARY_PATH"), 1, filename,
306 O_RDONLY, 0, &scratch_pathname);
308 if (scratch_chan < 0)
310 perror_with_name (filename);
312 /* Leave scratch_pathname allocated. abfd->name will point to it. */
314 abfd = bfd_fdopenr (scratch_pathname, gnutarget, scratch_chan);
317 close (scratch_chan);
318 error ("Could not open `%s' as an executable file: %s",
319 scratch_pathname, bfd_errmsg (bfd_get_error ()));
321 /* Leave bfd open, core_xfer_memory and "info files" need it. */
323 abfd -> cacheable = true;
325 if (!bfd_check_format (abfd, bfd_object))
327 error ("\"%s\": not in executable format: %s.",
328 scratch_pathname, bfd_errmsg (bfd_get_error ()));
330 if (build_section_table (abfd, &so -> sections, &so -> sections_end))
332 error ("Can't find the file sections in `%s': %s",
333 bfd_get_filename (exec_bfd), bfd_errmsg (bfd_get_error ()));
336 /* Irix 5 shared objects are pre-linked to particular addresses
337 although the dynamic linker may have to relocate them if the
338 address ranges of the libraries used by the main program clash.
339 The offset is the difference between the address where the object
340 is mapped and the binding address of the shared library. */
341 offset = (CORE_ADDR) LM_ADDR (so) - so -> lm.o_base_address;
343 for (p = so -> sections; p < so -> sections_end; p++)
345 /* Relocate the section binding addresses as recorded in the shared
346 object's file by the offset to get the address to which the
347 object was actually mapped. */
349 p -> endaddr += offset;
350 so -> lmend = (CORE_ADDR) max (p -> endaddr, so -> lmend);
351 if (STREQ (p -> the_bfd_section -> name, ".text"))
353 so -> textsection = p;
357 /* Free the file names, close the file now. */
358 do_cleanups (old_chain);
365 locate_base -- locate the base address of dynamic linker structs
369 CORE_ADDR locate_base (void)
373 For both the SunOS and SVR4 shared library implementations, if the
374 inferior executable has been linked dynamically, there is a single
375 address somewhere in the inferior's data space which is the key to
376 locating all of the dynamic linker's runtime structures. This
377 address is the value of the symbol defined by the macro DEBUG_BASE.
378 The job of this function is to find and return that address, or to
379 return 0 if there is no such address (the executable is statically
382 For SunOS, the job is almost trivial, since the dynamic linker and
383 all of it's structures are statically linked to the executable at
384 link time. Thus the symbol for the address we are looking for has
385 already been added to the minimal symbol table for the executable's
386 objfile at the time the symbol file's symbols were read, and all we
387 have to do is look it up there. Note that we explicitly do NOT want
388 to find the copies in the shared library.
390 The SVR4 version is much more complicated because the dynamic linker
391 and it's structures are located in the shared C library, which gets
392 run as the executable's "interpreter" by the kernel. We have to go
393 to a lot more work to discover the address of DEBUG_BASE. Because
394 of this complexity, we cache the value we find and return that value
395 on subsequent invocations. Note there is no copy in the executable
398 Irix 5 is basically like SunOS.
400 Note that we can assume nothing about the process state at the time
401 we need to find this address. We may be stopped on the first instruc-
402 tion of the interpreter (C shared library), the first instruction of
403 the executable itself, or somewhere else entirely (if we attached
404 to the process for example).
411 struct minimal_symbol *msymbol;
412 CORE_ADDR address = 0;
414 msymbol = lookup_minimal_symbol (DEBUG_BASE, NULL, symfile_objfile);
415 if ((msymbol != NULL) && (SYMBOL_VALUE_ADDRESS (msymbol) != 0))
417 address = SYMBOL_VALUE_ADDRESS (msymbol);
426 first_link_map_member -- locate first member in dynamic linker's map
430 static struct link_map *first_link_map_member (void)
434 Read in a copy of the first member in the inferior's dynamic
435 link map from the inferior's dynamic linker structures, and return
436 a pointer to the copy in our address space.
439 static struct obj_list *
440 first_link_map_member ()
445 read_memory (debug_base, (char *) &lm, sizeof (struct obj_list *));
450 /* The first entry in the list is the object file we are debugging,
452 read_memory ((CORE_ADDR) lm, (char *) &s, sizeof (struct obj_list));
461 find_solib -- step through list of shared objects
465 struct so_list *find_solib (struct so_list *so_list_ptr)
469 This module contains the routine which finds the names of any
470 loaded "images" in the current process. The argument in must be
471 NULL on the first call, and then the returned value must be passed
472 in on subsequent calls. This provides the capability to "step" down
473 the list of loaded objects. On the last object, a NULL value is
477 static struct so_list *
478 find_solib (so_list_ptr)
479 struct so_list *so_list_ptr; /* Last lm or NULL for first one */
481 struct so_list *so_list_next = NULL;
482 struct obj_list *lm = NULL;
485 if (so_list_ptr == NULL)
487 /* We are setting up for a new scan through the loaded images. */
488 if ((so_list_next = so_list_head) == NULL)
490 /* We have not already read in the dynamic linking structures
491 from the inferior, lookup the address of the base structure. */
492 debug_base = locate_base ();
495 /* Read the base structure in and find the address of the first
496 link map list member. */
497 lm = first_link_map_member ();
503 /* We have been called before, and are in the process of walking
504 the shared library list. Advance to the next shared object. */
505 if ((lm = so_list_ptr->ll.next) == NULL)
507 /* We have hit the end of the list, so check to see if any were
508 added, but be quiet if we can't read from the target any more. */
509 int status = target_read_memory ((CORE_ADDR) so_list_ptr -> lladdr,
510 (char *) &(so_list_ptr -> ll),
511 sizeof (struct obj_list));
514 lm = so_list_ptr->ll.next;
521 so_list_next = so_list_ptr -> next;
523 if ((so_list_next == NULL) && (lm != NULL))
528 /* Get next link map structure from inferior image and build a local
529 abbreviated load_map structure */
530 new = (struct so_list *) xmalloc (sizeof (struct so_list));
531 memset ((char *) new, 0, sizeof (struct so_list));
533 /* Add the new node as the next node in the list, or as the root
534 node if this is the first one. */
535 if (so_list_ptr != NULL)
537 so_list_ptr -> next = new;
544 read_memory ((CORE_ADDR) lm, (char *) &(new -> ll),
545 sizeof (struct obj_list));
546 read_memory ((CORE_ADDR) new->ll.data, (char *) &(new -> lm),
547 sizeof (struct obj));
548 target_read_string ((CORE_ADDR)new->lm.o_path, &buffer,
551 memory_error (errcode, (CORE_ADDR)new->lm.o_path);
552 new->lm.o_path = buffer;
553 solib_map_sections (new);
555 return (so_list_next);
558 /* A small stub to get us past the arg-passing pinhole of catch_errors. */
561 symbol_add_stub (arg)
564 register struct so_list *so = (struct so_list *) arg; /* catch_errs bogon */
566 so -> objfile = symbol_file_add (so -> lm.o_path, so -> from_tty,
567 (unsigned int) so -> textsection -> addr,
576 solib_add -- add a shared library file to the symtab and section list
580 void solib_add (char *arg_string, int from_tty,
581 struct target_ops *target)
588 solib_add (arg_string, from_tty, target)
591 struct target_ops *target;
593 register struct so_list *so = NULL; /* link map state variable */
595 /* Last shared library that we read. */
596 struct so_list *so_last = NULL;
602 if ((re_err = re_comp (arg_string ? arg_string : ".")) != NULL)
604 error ("Invalid regexp: %s", re_err);
607 /* Add the shared library sections to the section table of the
608 specified target, if any. */
611 /* Count how many new section_table entries there are. */
614 while ((so = find_solib (so)) != NULL)
616 if (so -> lm.o_path[0])
618 count += so -> sections_end - so -> sections;
624 /* Reallocate the target's section table including the new size. */
625 if (target -> to_sections)
627 old = target -> to_sections_end - target -> to_sections;
628 target -> to_sections = (struct section_table *)
629 xrealloc ((char *)target -> to_sections,
630 (sizeof (struct section_table)) * (count + old));
635 target -> to_sections = (struct section_table *)
636 xmalloc ((sizeof (struct section_table)) * count);
638 target -> to_sections_end = target -> to_sections + (count + old);
640 /* Add these section table entries to the target's table. */
641 while ((so = find_solib (so)) != NULL)
643 if (so -> lm.o_path[0])
645 count = so -> sections_end - so -> sections;
646 memcpy ((char *) (target -> to_sections + old),
648 (sizeof (struct section_table)) * count);
655 /* Now add the symbol files. */
656 while ((so = find_solib (so)) != NULL)
658 if (so -> lm.o_path[0] && re_exec (so -> lm.o_path))
660 so -> from_tty = from_tty;
661 if (so -> symbols_loaded)
665 printf_unfiltered ("Symbols already loaded for %s\n", so -> lm.o_path);
668 else if (catch_errors
669 (symbol_add_stub, (char *) so,
670 "Error while reading shared library symbols:\n",
674 so -> symbols_loaded = 1;
679 /* Getting new symbols may change our opinion about what is
682 reinit_frame_cache ();
689 info_sharedlibrary_command -- code for "info sharedlibrary"
693 static void info_sharedlibrary_command ()
697 Walk through the shared library list and print information
698 about each attached library.
702 info_sharedlibrary_command (ignore, from_tty)
706 register struct so_list *so = NULL; /* link map state variable */
709 if (exec_bfd == NULL)
711 printf_unfiltered ("No exec file.\n");
714 while ((so = find_solib (so)) != NULL)
716 if (so -> lm.o_path[0])
720 printf_unfiltered("%-12s%-12s%-12s%s\n", "From", "To", "Syms Read",
721 "Shared Object Library");
724 printf_unfiltered ("%-12s",
725 local_hex_string_custom ((unsigned long) LM_ADDR (so),
727 printf_unfiltered ("%-12s",
728 local_hex_string_custom ((unsigned long) so -> lmend,
730 printf_unfiltered ("%-12s", so -> symbols_loaded ? "Yes" : "No");
731 printf_unfiltered ("%s\n", so -> lm.o_path);
734 if (so_list_head == NULL)
736 printf_unfiltered ("No shared libraries loaded at this time.\n");
744 solib_address -- check to see if an address is in a shared lib
748 int solib_address (CORE_ADDR address)
752 Provides a hook for other gdb routines to discover whether or
753 not a particular address is within the mapped address space of
754 a shared library. Any address between the base mapping address
755 and the first address beyond the end of the last mapping, is
756 considered to be within the shared library address space, for
759 For example, this routine is called at one point to disable
760 breakpoints which are in shared libraries that are not currently
765 solib_address (address)
768 register struct so_list *so = 0; /* link map state variable */
770 while ((so = find_solib (so)) != NULL)
772 if (so -> lm.o_path[0])
774 if ((address >= (CORE_ADDR) LM_ADDR (so)) &&
775 (address < (CORE_ADDR) so -> lmend))
784 /* Called by free_all_symtabs */
789 struct so_list *next;
794 if (so_list_head -> sections)
796 free ((PTR)so_list_head -> sections);
798 if (so_list_head -> abfd)
800 bfd_filename = bfd_get_filename (so_list_head -> abfd);
801 if (!bfd_close (so_list_head -> abfd))
802 warning ("cannot close \"%s\": %s",
803 bfd_filename, bfd_errmsg (bfd_get_error ()));
806 /* This happens for the executable on SVR4. */
809 next = so_list_head -> next;
811 free ((PTR)bfd_filename);
812 free (so_list_head->lm.o_path);
813 free ((PTR)so_list_head);
823 disable_break -- remove the "mapping changed" breakpoint
827 static int disable_break ()
831 Removes the breakpoint that gets hit when the dynamic linker
832 completes a mapping change.
842 /* Note that breakpoint address and original contents are in our address
843 space, so we just need to write the original contents back. */
845 if (memory_remove_breakpoint (breakpoint_addr, shadow_contents) != 0)
850 /* For the SVR4 version, we always know the breakpoint address. For the
851 SunOS version we don't know it until the above code is executed.
852 Grumble if we are stopped anywhere besides the breakpoint address. */
854 if (stop_pc != breakpoint_addr)
856 warning ("stopped at unknown breakpoint while handling shared libraries");
866 enable_break -- arrange for dynamic linker to hit breakpoint
870 int enable_break (void)
874 This functions inserts a breakpoint at the entry point of the
875 main executable, where all shared libraries are mapped in.
881 if (symfile_objfile != NULL
882 && target_insert_breakpoint (symfile_objfile->ei.entry_point,
883 shadow_contents) == 0)
885 breakpoint_addr = symfile_objfile->ei.entry_point;
896 solib_create_inferior_hook -- shared library startup support
900 void solib_create_inferior_hook()
904 When gdb starts up the inferior, it nurses it along (through the
905 shell) until it is ready to execute it's first instruction. At this
906 point, this function gets called via expansion of the macro
907 SOLIB_CREATE_INFERIOR_HOOK.
909 For SunOS executables, this first instruction is typically the
910 one at "_start", or a similar text label, regardless of whether
911 the executable is statically or dynamically linked. The runtime
912 startup code takes care of dynamically linking in any shared
913 libraries, once gdb allows the inferior to continue.
915 For SVR4 executables, this first instruction is either the first
916 instruction in the dynamic linker (for dynamically linked
917 executables) or the instruction at "start" for statically linked
918 executables. For dynamically linked executables, the system
919 first exec's /lib/libc.so.N, which contains the dynamic linker,
920 and starts it running. The dynamic linker maps in any needed
921 shared libraries, maps in the actual user executable, and then
922 jumps to "start" in the user executable.
924 For both SunOS shared libraries, and SVR4 shared libraries, we
925 can arrange to cooperate with the dynamic linker to discover the
926 names of shared libraries that are dynamically linked, and the
927 base addresses to which they are linked.
929 This function is responsible for discovering those names and
930 addresses, and saving sufficient information about them to allow
931 their symbols to be read at a later time.
935 Between enable_break() and disable_break(), this code does not
936 properly handle hitting breakpoints which the user might have
937 set in the startup code or in the dynamic linker itself. Proper
938 handling will probably have to wait until the implementation is
939 changed to use the "breakpoint handler function" method.
941 Also, what if child has exit()ed? Must exit loop somehow.
945 solib_create_inferior_hook()
947 if (!enable_break ())
949 warning ("shared library handler failed to enable breakpoint");
953 /* Now run the target. It will eventually hit the breakpoint, at
954 which point all of the libraries will have been mapped in and we
955 can go groveling around in the dynamic linker structures to find
956 out what we need to know about them. */
958 clear_proceed_status ();
959 stop_soon_quietly = 1;
963 target_resume (-1, 0, stop_signal);
964 wait_for_inferior ();
966 while (stop_signal != SIGTRAP);
968 /* We are now either at the "mapping complete" breakpoint (or somewhere
969 else, a condition we aren't prepared to deal with anyway), so adjust
970 the PC as necessary after a breakpoint, disable the breakpoint, and
971 add any shared libraries that were mapped in. */
973 if (DECR_PC_AFTER_BREAK)
975 stop_pc -= DECR_PC_AFTER_BREAK;
976 write_register (PC_REGNUM, stop_pc);
979 if (!disable_break ())
981 warning ("shared library handler failed to disable breakpoint");
984 /* solib_add will call reinit_frame_cache.
985 But we are stopped in the startup code and we might not have symbols
986 for the startup code, so heuristic_proc_start could be called
987 and will put out an annoying warning.
988 Delaying the resetting of stop_soon_quietly until after symbol loading
989 suppresses the warning. */
990 solib_add ((char *) 0, 0, (struct target_ops *) 0);
991 stop_soon_quietly = 0;
998 sharedlibrary_command -- handle command to explicitly add library
1002 static void sharedlibrary_command (char *args, int from_tty)
1009 sharedlibrary_command (args, from_tty)
1014 solib_add (args, from_tty, (struct target_ops *) 0);
1021 add_com ("sharedlibrary", class_files, sharedlibrary_command,
1022 "Load shared object library symbols for files matching REGEXP.");
1023 add_info ("sharedlibrary", info_sharedlibrary_command,
1024 "Status of loaded shared object libraries.");