about summary refs log tree commit diff
path: root/posix/unistd.h
diff options
context:
space:
mode:
authorRoland McGrath <roland@gnu.org>1996-07-29 00:18:42 +0000
committerRoland McGrath <roland@gnu.org>1996-07-29 00:18:42 +0000
commitcddcfecfd1a8f91ee1da1c0147a4f07aee1846a0 (patch)
tree4056b4c91d60d2246ea8a04e3b4a1ee01062f7f9 /posix/unistd.h
parent40fa2c8c2f031aef8463ae219ed6929f90fa1d46 (diff)
downloadglibc-cddcfecfd1a8f91ee1da1c0147a4f07aee1846a0.tar.gz
glibc-cddcfecfd1a8f91ee1da1c0147a4f07aee1846a0.tar.xz
glibc-cddcfecfd1a8f91ee1da1c0147a4f07aee1846a0.zip
Sat Jul 27 13:02:09 1996 Ulrich Drepper <drepper@cygnus.com>
	* elf/rtld.c (dl_main): Ignore arguments when environment variable
 	LD_TRACE_LOADED_OBJECTS is set.

Sun Jul 28 19:42:51 1996  Roland McGrath  <roland@delasyd.gnu.ai.mit.edu>

	* sysdeps/generic/dl-sysdep.c (_dl_sysdep_start): Initialize
	__libc_enable_secure instead of _dl_secure.
	* sysdeps/mach/hurd/dl-sysdep.c (_dl_sysdep_start): Likewise.
	* elf/dl-load.c (_dl_map_object): Check __libc_enable_secure instead
	of _dl_secure.
	* elf/Makefile (routines): Add enbl-secure.
	(elide-routines.so): Here too.
	* sysdeps/generic/enbl-secure.c: New file.
	* posix/unistd.h [__USE_GNU]: Declare `__libc_enable_secure' flag.
	* elf/dl-support.c (_dl_secure): Variable removed.
	* elf/rtld.c: Likewise.  Replace all uses with __libc_enable_secure.

Sun Jul 28 19:26:40 1996  David S. Miller  <dm@neteng.engr.sgi.com>

	* sysdeps/mips/dl-machine.h (ELF_MACHINE_RUNTIME_TRAMPOLINE):
	Declare _dl_runtime_resolve with __attribute__ ((unused)) so the
	compiler doesn't elide it.
	(elf_machine_rel): Follow Jul 14 change in sysdeps/i386/dl-machine.h.
Diffstat (limited to 'posix/unistd.h')
-rw-r--r--posix/unistd.h8
1 files changed, 8 insertions, 0 deletions
diff --git a/posix/unistd.h b/posix/unistd.h
index 1247728121..424cedd2ec 100644
--- a/posix/unistd.h
+++ b/posix/unistd.h
@@ -776,6 +776,14 @@ extern int lockf __P ((int __fd, int __cmd, __off_t __len));
        while (__result == -1L && errno == EINTR);			      \
        __result; }))							      \
 
+
+/* This variable is set nonzero at startup if the process's effective IDs
+   differ from its real IDs, or it is otherwise indicated that extra
+   security should be used.  When this is set the dynamic linker ignores
+   the various environment variables that normally affect it.  */
+
+extern int __libc_enable_secure;
+
 #endif
 
 #ifdef __USE_POSIX