diff options
author | Ulrich Drepper <drepper@redhat.com> | 1999-07-23 22:58:50 +0000 |
---|---|---|
committer | Ulrich Drepper <drepper@redhat.com> | 1999-07-23 22:58:50 +0000 |
commit | 06535ae9487708dad9048552c9c92828d998a897 (patch) | |
tree | 644ca3f36a0aca375c41e6bdded2d3904b8821e9 /posix | |
parent | fc9cfb28c05def1bfc0edc099d8001f83654fd10 (diff) | |
download | glibc-06535ae9487708dad9048552c9c92828d998a897.tar glibc-06535ae9487708dad9048552c9c92828d998a897.tar.gz glibc-06535ae9487708dad9048552c9c92828d998a897.tar.bz2 glibc-06535ae9487708dad9048552c9c92828d998a897.zip |
Update.
* posix/unistd.h: Move declaration of __libc_enable_secure to...
* include/unistd.h: ...here.
* elf/dl-open.c (dl_open_worker): If DST is used in SUID program punt.
* elf/dl-deps.c (expand_dst): Likewise.
* elf/dynamic-link.h: Set DT_SYMBOLIC, DT_TEXTREL, and DT_BIND_NOW
based on DT_FLAGS value.
* elf/do-lookup.h: Remove reference_name parameter, add undef_map.
Add test for symbols marked STV_HIDDEN.
* elf/dl-lookup.c (_dl_lookup_symbol): Remove reference_name parameter,
add undef_map. Compute reference_name locally. Update call to
do_lookup.
(_dl_lookup_symbol_skip): Likewise.
(_dl_lookup_versioned_symbol): Likewise.
(_dl_lookup_versioned_symbol_skip): Likewise.
* elf/dl-libc.c: Update call to _dl_lookup_*symbol.
* elf/dl-runtime.c: Likewise.
* elf/dl-sym.c: Likewise.
* elf/dl-symbol.c: Likewise.
* elf/ldsodefs.h: Adjust prototypes.
* elf/dl-reloc.c (RESOLV): Add test for STV_PROTECTED flag set and
handle appropriately. Add comment about DT_TEXTREL.
* elf/dl-runtime.c: Likewise.
Diffstat (limited to 'posix')
-rw-r--r-- | posix/unistd.h | 11 |
1 files changed, 1 insertions, 10 deletions
diff --git a/posix/unistd.h b/posix/unistd.h index ea1d47b2fb..d8800b7b3b 100644 --- a/posix/unistd.h +++ b/posix/unistd.h @@ -927,16 +927,7 @@ extern int lockf64 __P ((int __fd, int __cmd, __off64_t __len)); ({ long int __result; \ do __result = (long int) (expression); \ while (__result == -1L && errno == EINTR); \ - __result; })) \ - - -/* This variable is set nonzero at startup if the process's effective - IDs differ from its real IDs, or it is otherwise indicated that - extra security should be used. When this is set the dynamic linker - and some functions contained in the C library ignore various - environment variables that normally affect them. */ -extern int __libc_enable_secure; - + __result; })) #endif #if defined __USE_POSIX199309 || defined __USE_UNIX98 |