diff options
author | Roland McGrath <roland@gnu.org> | 1996-07-29 00:18:42 +0000 |
---|---|---|
committer | Roland McGrath <roland@gnu.org> | 1996-07-29 00:18:42 +0000 |
commit | cddcfecfd1a8f91ee1da1c0147a4f07aee1846a0 (patch) | |
tree | 4056b4c91d60d2246ea8a04e3b4a1ee01062f7f9 /posix | |
parent | 40fa2c8c2f031aef8463ae219ed6929f90fa1d46 (diff) | |
download | glibc-cddcfecfd1a8f91ee1da1c0147a4f07aee1846a0.zip glibc-cddcfecfd1a8f91ee1da1c0147a4f07aee1846a0.tar.gz glibc-cddcfecfd1a8f91ee1da1c0147a4f07aee1846a0.tar.bz2 |
Sat Jul 27 13:02:09 1996 Ulrich Drepper <drepper@cygnus.com>
* elf/rtld.c (dl_main): Ignore arguments when environment variable
LD_TRACE_LOADED_OBJECTS is set.
Sun Jul 28 19:42:51 1996 Roland McGrath <roland@delasyd.gnu.ai.mit.edu>
* sysdeps/generic/dl-sysdep.c (_dl_sysdep_start): Initialize
__libc_enable_secure instead of _dl_secure.
* sysdeps/mach/hurd/dl-sysdep.c (_dl_sysdep_start): Likewise.
* elf/dl-load.c (_dl_map_object): Check __libc_enable_secure instead
of _dl_secure.
* elf/Makefile (routines): Add enbl-secure.
(elide-routines.so): Here too.
* sysdeps/generic/enbl-secure.c: New file.
* posix/unistd.h [__USE_GNU]: Declare `__libc_enable_secure' flag.
* elf/dl-support.c (_dl_secure): Variable removed.
* elf/rtld.c: Likewise. Replace all uses with __libc_enable_secure.
Sun Jul 28 19:26:40 1996 David S. Miller <dm@neteng.engr.sgi.com>
* sysdeps/mips/dl-machine.h (ELF_MACHINE_RUNTIME_TRAMPOLINE):
Declare _dl_runtime_resolve with __attribute__ ((unused)) so the
compiler doesn't elide it.
(elf_machine_rel): Follow Jul 14 change in sysdeps/i386/dl-machine.h.
Diffstat (limited to 'posix')
-rw-r--r-- | posix/unistd.h | 8 |
1 files changed, 8 insertions, 0 deletions
diff --git a/posix/unistd.h b/posix/unistd.h index 1247728..424cedd 100644 --- a/posix/unistd.h +++ b/posix/unistd.h @@ -776,6 +776,14 @@ extern int lockf __P ((int __fd, int __cmd, __off_t __len)); while (__result == -1L && errno == EINTR); \ __result; })) \ + +/* This variable is set nonzero at startup if the process's effective IDs + differ from its real IDs, or it is otherwise indicated that extra + security should be used. When this is set the dynamic linker ignores + the various environment variables that normally affect it. */ + +extern int __libc_enable_secure; + #endif #ifdef __USE_POSIX |