mirror of https://github.com/mkerrisk/man-pages
ld.so.8: ffix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
parent
d81099fbbd
commit
bdf75f3e20
66
man8/ld.so.8
66
man8/ld.so.8
|
@ -250,8 +250,7 @@ LinuxThreads and NPTL
|
|||
see
|
||||
.BR pthreads (7).
|
||||
.TP
|
||||
.B LD_BIND_NOW
|
||||
(libc5; glibc since 2.1.1)
|
||||
.BR LD_BIND_NOW " (libc5; glibc since 2.1.1)"
|
||||
If set to a nonempty string,
|
||||
causes the dynamic linker to resolve all symbols
|
||||
at program startup instead of deferring function call resolution to the point
|
||||
|
@ -320,8 +319,7 @@ as described above in
|
|||
.\" which will reload the libmod.so in 'lib' or 'lib64', using it
|
||||
.\" in preference to the version in '.'.
|
||||
.TP
|
||||
.B LD_TRACE_LOADED_OBJECTS
|
||||
(ELF only)
|
||||
.BR LD_TRACE_LOADED_OBJECTS " (ELF only)"
|
||||
If set (to any value), causes the program to list its dynamic
|
||||
dependencies, as if run by
|
||||
.BR ldd (1),
|
||||
|
@ -330,24 +328,21 @@ instead of running normally.
|
|||
Then there are lots of more or less obscure variables,
|
||||
many obsolete or only for internal use.
|
||||
.TP
|
||||
.B LD_AOUT_LIBRARY_PATH
|
||||
(libc5)
|
||||
.BR LD_AOUT_LIBRARY_PATH " (libc5)"
|
||||
Version of
|
||||
.B LD_LIBRARY_PATH
|
||||
for a.out binaries only.
|
||||
Old versions of ld\-linux.so.1 also supported
|
||||
.BR LD_ELF_LIBRARY_PATH .
|
||||
.TP
|
||||
.B LD_AOUT_PRELOAD
|
||||
(libc5)
|
||||
.BR LD_AOUT_PRELOAD " (libc5)"
|
||||
Version of
|
||||
.B LD_PRELOAD
|
||||
for a.out binaries only.
|
||||
Old versions of ld\-linux.so.1 also supported
|
||||
.BR LD_ELF_PRELOAD .
|
||||
.TP
|
||||
.B LD_AUDIT
|
||||
(glibc since 2.4)
|
||||
.BR LD_AUDIT " (glibc since 2.4)"
|
||||
A colon-separated list of user-specified, ELF shared objects
|
||||
to be loaded before all others in a separate linker namespace
|
||||
(i.e., one that does not intrude upon the normal symbol bindings that
|
||||
|
@ -369,14 +364,12 @@ as described in its
|
|||
in the chapter
|
||||
.IR "Runtime Linker Auditing Interface" .
|
||||
.TP
|
||||
.B LD_BIND_NOT
|
||||
(glibc since 2.1.95)
|
||||
.BR LD_BIND_NOT " (glibc since 2.1.95)"
|
||||
If this environment variable is set to a nonempty string,
|
||||
do not update the GOT (global offset table) and PLT (procedure linkage table)
|
||||
after resolving a symbol.
|
||||
.TP
|
||||
.B LD_DEBUG
|
||||
(glibc since 2.1)
|
||||
.BR LD_DEBUG " (glibc since 2.1)"
|
||||
Output verbose debugging information about the dynamic linker.
|
||||
If set to
|
||||
.BR all ,
|
||||
|
@ -428,8 +421,7 @@ is ignored in secure-execution mode, unless the file
|
|||
.IR /etc/suid\-debug
|
||||
exists (the content of the file is irrelevant).
|
||||
.TP
|
||||
.B LD_DEBUG_OUTPUT
|
||||
(glibc since 2.1)
|
||||
.BR LD_DEBUG_OUTPUT " (glibc since 2.1)"
|
||||
File in which
|
||||
.B LD_DEBUG
|
||||
output should be written.
|
||||
|
@ -437,8 +429,7 @@ The default is standard error.
|
|||
.B LD_DEBUG_OUTPUT
|
||||
is ignored in secure-execution mode.
|
||||
.TP
|
||||
.B LD_DYNAMIC_WEAK
|
||||
(glibc since 2.1.91)
|
||||
.BR LD_DYNAMIC_WEAK " (glibc since 2.1.91)"
|
||||
If this environment variable is defined (with any value),
|
||||
allow weak symbols to be overridden (reverting to old glibc behavior).
|
||||
.\" See weak handling
|
||||
|
@ -452,22 +443,18 @@ Since glibc 2.3.4,
|
|||
.B LD_DYNAMIC_WEAK
|
||||
is ignored in secure-execution mode.
|
||||
.TP
|
||||
.B LD_HWCAP_MASK
|
||||
(glibc since 2.1)
|
||||
.BR LD_HWCAP_MASK " (glibc since 2.1)"
|
||||
Mask for hardware capabilities.
|
||||
.TP
|
||||
.B LD_KEEPDIR
|
||||
(a.out only)(libc5)
|
||||
.BR LD_KEEPDIR " (a.out only; libc5)"
|
||||
Don't ignore the directory in the names of a.out libraries to be loaded.
|
||||
Use of this option is strongly discouraged.
|
||||
.TP
|
||||
.B LD_NOWARN
|
||||
(a.out only)(libc5)
|
||||
.BR LD_NOWARN " (a.out only; libc5)"
|
||||
Suppress warnings about a.out libraries with incompatible minor
|
||||
version numbers.
|
||||
.TP
|
||||
.B LD_ORIGIN_PATH
|
||||
(glibc since 2.1)
|
||||
.BR LD_ORIGIN_PATH " (glibc since 2.1)"
|
||||
Path where the binary is found.
|
||||
Since glibc 2.4,
|
||||
.B LD_ORIGIN_PATH
|
||||
|
@ -475,8 +462,7 @@ is ignored in secure-execution mode.
|
|||
.\" Only used if $ORIGIN can't be determined by normal means
|
||||
.\" (from the origin path saved at load time, or from /proc/self/exe)?
|
||||
.TP
|
||||
.B LD_POINTER_GUARD
|
||||
(glibc from 2.4 to 2.22)
|
||||
.BR LD_POINTER_GUARD " (glibc from 2.4 to 2.22)"
|
||||
Set to 0 to disable pointer guarding.
|
||||
Any other value enables pointer guarding, which is also the default.
|
||||
Pointer guarding is a security mechanism whereby some pointers to code
|
||||
|
@ -492,15 +478,13 @@ Since glibc 2.23,
|
|||
can no longer be used to disable pointer guarding,
|
||||
which is now always enabled.
|
||||
.TP
|
||||
.B LD_PROFILE
|
||||
(glibc since 2.1)
|
||||
.BR LD_PROFILE " (glibc since 2.1)"
|
||||
The name of a (single) shared object to be profiled,
|
||||
specified either as a pathname or a soname.
|
||||
Profiling output is appended to the file whose name is:
|
||||
"\fI$LD_PROFILE_OUTPUT\fP/\fI$LD_PROFILE\fP.profile".
|
||||
.TP
|
||||
.B LD_PROFILE_OUTPUT
|
||||
(glibc since 2.1)
|
||||
.BR LD_PROFILE_OUTPUT " (glibc since 2.1)"
|
||||
Directory where
|
||||
.B LD_PROFILE
|
||||
output should be written.
|
||||
|
@ -512,8 +496,7 @@ is ignored in secure-execution mode; instead
|
|||
.IR /var/profile
|
||||
is always used.
|
||||
.TP
|
||||
.B LD_SHOW_AUXV
|
||||
(glibc since 2.1)
|
||||
.BR LD_SHOW_AUXV " (glibc since 2.1)"
|
||||
If this environment variable is defined (with any value),
|
||||
show the auxiliary array passed up from the kernel (see also
|
||||
.BR getauxval (3)).
|
||||
|
@ -521,8 +504,7 @@ Since glibc 2.3.5,
|
|||
.B LD_SHOW_AUXV
|
||||
is ignored in secure-execution mode.
|
||||
.TP
|
||||
.B LD_TRACE_PRELINKING
|
||||
(glibc since 2.4)
|
||||
.BR LD_TRACE_PRELINKING " (glibc since 2.4)"
|
||||
If this environment variable is defined (with any value),
|
||||
trace prelinking of the object whose name is assigned to
|
||||
this environment variable.
|
||||
|
@ -552,20 +534,17 @@ is defined with the value 0,
|
|||
neither executables nor PIEs will honor the base addresses.
|
||||
This variable is ignored in secure-execution mode.
|
||||
.TP
|
||||
.B LD_VERBOSE
|
||||
(glibc since 2.1)
|
||||
.BR LD_VERBOSE " (glibc since 2.1)"
|
||||
If set to a nonempty string,
|
||||
output symbol versioning information about the
|
||||
program if the
|
||||
.B LD_TRACE_LOADED_OBJECTS
|
||||
environment variable has been set.
|
||||
.TP
|
||||
.B LD_WARN
|
||||
(ELF only)(glibc since 2.1.3)
|
||||
.BR LD_WARN " (ELF only; glibc since 2.1.3)
|
||||
If set to a nonempty string, warn about unresolved symbols.
|
||||
.TP
|
||||
.B LD_PREFER_MAP_32BIT_EXEC
|
||||
(x86-64 only)(glibc since 2.23)
|
||||
.BR LD_PREFER_MAP_32BIT_EXEC " (x86-64 only; glibc since 2.23)"
|
||||
According to the Intel Silvermont software optimization guide, for 64-bit
|
||||
applications, branch prediction performance can be negatively impacted
|
||||
when the target of a branch is more than 4GB away from the branch.
|
||||
|
@ -583,8 +562,7 @@ randomization (ASLR),
|
|||
.B LD_PREFER_MAP_32BIT_EXEC
|
||||
is always disabled in secure-execution mode.
|
||||
.TP
|
||||
.B LDD_ARGV0
|
||||
(libc5)
|
||||
.BR LDD_ARGV0 " (libc5)"
|
||||
.IR argv [0]
|
||||
to be used by
|
||||
.BR ldd (1)
|
||||
|
|
Loading…
Reference in New Issue