mirror of
https://sourceware.org/git/glibc.git
synced 2024-12-29 14:01:20 +00:00
74955460c5
2000-09-26 Thorsten Kukuk <kukuk@suse.de> * nscd/dbg_log.c (dbg_log): Add missing format string. * catgets/catgets.c (catopen): Use getenv instead of __secure_getenv since we filter out the variable once. * iconv/gconv_conf.c (__gconv_get_path): Likewise. * locale/newlocale.c (__newlocale): Likewise. * locale/setlocale.c (setlocale): Likewise. * malloc/malloc.c (ptmalloc_init): Likewise. * resolv/res_hconf.c (_res_hconf_init): Likewise. * resolv/res_init.c (__res_vinit): Likewise. * time/tzfile.c (__tzfile_read): Likewise. * sysdeps/generic/unsecvars.h: New file. * elf/dl-support.c (non_dynamic_init): Use it here to remove variables. * elf/rtld.c (process_envvars): Likewise. * elf/Makefile (distribute): Add unsecvars.h.
178 lines
5.5 KiB
C
178 lines
5.5 KiB
C
/* Support for dynamic linking code in static libc.
|
|
Copyright (C) 1996,97,98,99,2000 Free Software Foundation, Inc.
|
|
This file is part of the GNU C Library.
|
|
|
|
The GNU C Library is free software; you can redistribute it and/or
|
|
modify it under the terms of the GNU Library General Public License as
|
|
published by the Free Software Foundation; either version 2 of the
|
|
License, or (at your option) any later version.
|
|
|
|
The GNU C Library is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
Library General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Library General Public
|
|
License along with the GNU C Library; see the file COPYING.LIB. If not,
|
|
write to the Free Software Foundation, Inc., 59 Temple Place - Suite 330,
|
|
Boston, MA 02111-1307, USA. */
|
|
|
|
/* This file defines some things that for the dynamic linker are defined in
|
|
rtld.c and dl-sysdep.c in ways appropriate to bootstrap dynamic linking. */
|
|
|
|
#include <errno.h>
|
|
#include <libintl.h>
|
|
#include <stdlib.h>
|
|
#include <unistd.h>
|
|
#include <ldsodefs.h>
|
|
#include <dl-machine.h>
|
|
#include <bits/libc-lock.h>
|
|
#include <dl-librecon.h>
|
|
#include <unsecvars.h>
|
|
|
|
extern char *__progname;
|
|
char **_dl_argv = &__progname; /* This is checked for some error messages. */
|
|
|
|
/* Name of the architecture. */
|
|
const char *_dl_platform;
|
|
size_t _dl_platformlen;
|
|
|
|
int _dl_debug_libs;
|
|
int _dl_debug_impcalls;
|
|
int _dl_debug_bindings;
|
|
int _dl_debug_symbols;
|
|
int _dl_debug_versions;
|
|
int _dl_debug_reloc;
|
|
int _dl_debug_files;
|
|
int _dl_lazy;
|
|
/* XXX I know about at least one case where we depend on the old weak
|
|
behavior (it has to do with librt). Until we get DSO groups implemented
|
|
we have to make this the default. Bummer. --drepper */
|
|
#if 0
|
|
int _dl_dynamic_weak;
|
|
#else
|
|
int _dl_dynamic_weak = 1;
|
|
#endif
|
|
|
|
/* If nonzero print warnings about problematic situations. */
|
|
int _dl_verbose;
|
|
|
|
/* Structure to store information about search paths. */
|
|
struct r_search_path *_dl_search_paths;
|
|
|
|
/* We never do profiling. */
|
|
const char *_dl_profile;
|
|
|
|
/* Names of shared object for which the RUNPATHs and RPATHs should be
|
|
ignored. */
|
|
const char *_dl_inhibit_rpath;
|
|
|
|
/* The map for the object we will profile. */
|
|
struct link_map *_dl_profile_map;
|
|
|
|
/* This is the address of the last stack address ever used. */
|
|
void *__libc_stack_end;
|
|
|
|
/* Path where the binary is found. */
|
|
const char *_dl_origin_path;
|
|
|
|
/* Nonzero if runtime lookup should not update the .got/.plt. */
|
|
int _dl_bind_not;
|
|
|
|
/* Initially empty list of loaded objects. */
|
|
struct link_map *_dl_loaded;
|
|
/* Number of object in the _dl_loaded list. */
|
|
unsigned int _dl_nloaded;
|
|
|
|
/* Fake scope. In dynamically linked binaries this is the scope of the
|
|
main application but here we don't have something like this. So
|
|
create a fake scope containing nothing. */
|
|
struct r_scope_elem _dl_initial_searchlist;
|
|
/* Variable which can be used in lookup to process the global scope. */
|
|
struct r_scope_elem *_dl_global_scope[2] = { &_dl_initial_searchlist, NULL };
|
|
/* This is a global pointer to this structure which is public. It is
|
|
used by dlopen/dlclose to add and remove objects from what is regarded
|
|
to be the global scope. */
|
|
struct r_scope_elem *_dl_main_searchlist = &_dl_initial_searchlist;
|
|
|
|
/* Nonzero during startup. */
|
|
int _dl_starting_up = 1;
|
|
|
|
/* During the program run we must not modify the global data of
|
|
loaded shared object simultanously in two threads. Therefore we
|
|
protect `_dl_open' and `_dl_close' in dl-close.c.
|
|
|
|
This must be a recursive lock since the initializer function of
|
|
the loaded object might as well require a call to this function.
|
|
At this time it is not anymore a problem to modify the tables. */
|
|
__libc_lock_define_initialized_recursive (, _dl_load_lock)
|
|
|
|
|
|
static void non_dynamic_init (void) __attribute__ ((unused));
|
|
|
|
static void
|
|
non_dynamic_init (void)
|
|
{
|
|
_dl_verbose = *(getenv ("LD_WARN") ?: "") == '\0' ? 0 : 1;
|
|
|
|
_dl_pagesize = __getpagesize ();
|
|
|
|
/* Initialize the data structures for the search paths for shared
|
|
objects. */
|
|
_dl_init_paths (getenv ("LD_LIBRARY_PATH"));
|
|
|
|
_dl_lazy = *(getenv ("LD_BIND_NOW") ?: "") == '\0';
|
|
|
|
_dl_bind_not = *(getenv ("LD_BIND_NOT") ?: "") != '\0';
|
|
|
|
_dl_dynamic_weak = *(getenv ("LD_DYNAMIC_WEAK") ?: "") == '\0';
|
|
|
|
if (__libc_enable_secure)
|
|
{
|
|
static const char *unsecure_envvars[] =
|
|
{
|
|
UNSECURE_ENVVARS,
|
|
#ifdef EXTRA_UNSECURE_ENVVARS
|
|
EXTRA_UNSECURE_ENVVARS
|
|
#endif
|
|
};
|
|
size_t cnt;
|
|
|
|
for (cnt = 0;
|
|
cnt < sizeof (unsecure_envvars) / sizeof (unsecure_envvars[0]);
|
|
++cnt)
|
|
unsetenv (unsecure_envvars[cnt]);
|
|
|
|
if (__access ("/etc/suid-debug", F_OK) != 0)
|
|
unsetenv ("MALLOC_CHECK_");
|
|
}
|
|
|
|
#ifdef DL_PLATFORM_INIT
|
|
DL_PLATFORM_INIT;
|
|
#endif
|
|
|
|
/* Now determine the length of the platform string. */
|
|
if (_dl_platform != NULL)
|
|
_dl_platformlen = strlen (_dl_platform);
|
|
}
|
|
text_set_element (__libc_subinit, non_dynamic_init);
|
|
|
|
const struct r_strlenpair *
|
|
internal_function
|
|
_dl_important_hwcaps (const char *platform, size_t platform_len, size_t *sz,
|
|
size_t *max_capstrlen)
|
|
{
|
|
struct r_strlenpair *result;
|
|
|
|
/* XXX We don't try to find the capabilities in this case. */
|
|
result = (struct r_strlenpair *) malloc (sizeof (*result));
|
|
if (result == NULL)
|
|
_dl_signal_error (ENOMEM, NULL, N_("cannot create capability list"));
|
|
|
|
result[0].str = (char *) result; /* Does not really matter. */
|
|
result[0].len = 0;
|
|
|
|
*sz = 1;
|
|
return result;
|
|
}
|