diff options
author | Ulrich Drepper <drepper@redhat.com> | 1999-07-23 22:58:50 +0000 |
---|---|---|
committer | Ulrich Drepper <drepper@redhat.com> | 1999-07-23 22:58:50 +0000 |
commit | 06535ae9487708dad9048552c9c92828d998a897 (patch) | |
tree | 644ca3f36a0aca375c41e6bdded2d3904b8821e9 /include | |
parent | fc9cfb28c05def1bfc0edc099d8001f83654fd10 (diff) | |
download | glibc-06535ae9487708dad9048552c9c92828d998a897.tar.gz glibc-06535ae9487708dad9048552c9c92828d998a897.tar.xz glibc-06535ae9487708dad9048552c9c92828d998a897.zip |
Update.
* posix/unistd.h: Move declaration of __libc_enable_secure to... * include/unistd.h: ...here. * elf/dl-open.c (dl_open_worker): If DST is used in SUID program punt. * elf/dl-deps.c (expand_dst): Likewise. * elf/dynamic-link.h: Set DT_SYMBOLIC, DT_TEXTREL, and DT_BIND_NOW based on DT_FLAGS value. * elf/do-lookup.h: Remove reference_name parameter, add undef_map. Add test for symbols marked STV_HIDDEN. * elf/dl-lookup.c (_dl_lookup_symbol): Remove reference_name parameter, add undef_map. Compute reference_name locally. Update call to do_lookup. (_dl_lookup_symbol_skip): Likewise. (_dl_lookup_versioned_symbol): Likewise. (_dl_lookup_versioned_symbol_skip): Likewise. * elf/dl-libc.c: Update call to _dl_lookup_*symbol. * elf/dl-runtime.c: Likewise. * elf/dl-sym.c: Likewise. * elf/dl-symbol.c: Likewise. * elf/ldsodefs.h: Adjust prototypes. * elf/dl-reloc.c (RESOLV): Add test for STV_PROTECTED flag set and handle appropriately. Add comment about DT_TEXTREL. * elf/dl-runtime.c: Likewise.
Diffstat (limited to 'include')
-rw-r--r-- | include/unistd.h | 9 |
1 files changed, 9 insertions, 0 deletions
diff --git a/include/unistd.h b/include/unistd.h index 955637e0fb..06fa8fbd93 100644 --- a/include/unistd.h +++ b/include/unistd.h @@ -63,4 +63,13 @@ extern int __profil __P ((unsigned short int *__sample_buffer, size_t __size, size_t __offset, unsigned int __scale)); extern int __getdtablesize __P ((void)); extern int __brk __P ((__ptr_t __addr)); + + +/* This variable is set nonzero at startup if the process's effective + IDs differ from its real IDs, or it is otherwise indicated that + extra security should be used. When this is set the dynamic linker + and some functions contained in the C library ignore various + environment variables that normally affect them. */ +extern int __libc_enable_secure; + #endif |