diff options
author | Ulrich Drepper <drepper@redhat.com> | 1999-07-23 22:58:50 +0000 |
---|---|---|
committer | Ulrich Drepper <drepper@redhat.com> | 1999-07-23 22:58:50 +0000 |
commit | 06535ae9487708dad9048552c9c92828d998a897 (patch) | |
tree | 644ca3f36a0aca375c41e6bdded2d3904b8821e9 /include | |
parent | fc9cfb28c05def1bfc0edc099d8001f83654fd10 (diff) | |
download | glibc-06535ae9487708dad9048552c9c92828d998a897.tar glibc-06535ae9487708dad9048552c9c92828d998a897.tar.gz glibc-06535ae9487708dad9048552c9c92828d998a897.tar.bz2 glibc-06535ae9487708dad9048552c9c92828d998a897.zip |
Update.
* posix/unistd.h: Move declaration of __libc_enable_secure to...
* include/unistd.h: ...here.
* elf/dl-open.c (dl_open_worker): If DST is used in SUID program punt.
* elf/dl-deps.c (expand_dst): Likewise.
* elf/dynamic-link.h: Set DT_SYMBOLIC, DT_TEXTREL, and DT_BIND_NOW
based on DT_FLAGS value.
* elf/do-lookup.h: Remove reference_name parameter, add undef_map.
Add test for symbols marked STV_HIDDEN.
* elf/dl-lookup.c (_dl_lookup_symbol): Remove reference_name parameter,
add undef_map. Compute reference_name locally. Update call to
do_lookup.
(_dl_lookup_symbol_skip): Likewise.
(_dl_lookup_versioned_symbol): Likewise.
(_dl_lookup_versioned_symbol_skip): Likewise.
* elf/dl-libc.c: Update call to _dl_lookup_*symbol.
* elf/dl-runtime.c: Likewise.
* elf/dl-sym.c: Likewise.
* elf/dl-symbol.c: Likewise.
* elf/ldsodefs.h: Adjust prototypes.
* elf/dl-reloc.c (RESOLV): Add test for STV_PROTECTED flag set and
handle appropriately. Add comment about DT_TEXTREL.
* elf/dl-runtime.c: Likewise.
Diffstat (limited to 'include')
-rw-r--r-- | include/unistd.h | 9 |
1 files changed, 9 insertions, 0 deletions
diff --git a/include/unistd.h b/include/unistd.h index 955637e0fb..06fa8fbd93 100644 --- a/include/unistd.h +++ b/include/unistd.h @@ -63,4 +63,13 @@ extern int __profil __P ((unsigned short int *__sample_buffer, size_t __size, size_t __offset, unsigned int __scale)); extern int __getdtablesize __P ((void)); extern int __brk __P ((__ptr_t __addr)); + + +/* This variable is set nonzero at startup if the process's effective + IDs differ from its real IDs, or it is otherwise indicated that + extra security should be used. When this is set the dynamic linker + and some functions contained in the C library ignore various + environment variables that normally affect them. */ +extern int __libc_enable_secure; + #endif |