aboutsummaryrefslogtreecommitdiffstats
path: root/man8
diff options
context:
space:
mode:
authorMichael Kerrisk <mtk.manpages@gmail.com>2016-09-11 11:08:05 +0100
committerMichael Kerrisk <mtk.manpages@gmail.com>2016-09-11 11:08:05 +0100
commitbdf75f3e207586c940ef787b84688f942d348eba (patch)
tree973298648dd1a52ad8b04dfe2fb113ad554fa1f7 /man8
parentd81099fbbd423d122c8b7044d2e782ab51e1e3b4 (diff)
downloadman-pages-bdf75f3e207586c940ef787b84688f942d348eba.tar.gz
ld.so.8: ffix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
Diffstat (limited to 'man8')
-rw-r--r--man8/ld.so.866
1 files changed, 22 insertions, 44 deletions
diff --git a/man8/ld.so.8 b/man8/ld.so.8
index ec79947d44..02e605aa28 100644
--- a/man8/ld.so.8
+++ b/man8/ld.so.8
@@ -250,8 +250,7 @@ LinuxThreads and NPTL
see
.BR pthreads (7).
.TP
-.B LD_BIND_NOW
-(libc5; glibc since 2.1.1)
+.BR LD_BIND_NOW " (libc5; glibc since 2.1.1)"
If set to a nonempty string,
causes the dynamic linker to resolve all symbols
at program startup instead of deferring function call resolution to the point
@@ -320,8 +319,7 @@ as described above in
.\" which will reload the libmod.so in 'lib' or 'lib64', using it
.\" in preference to the version in '.'.
.TP
-.B LD_TRACE_LOADED_OBJECTS
-(ELF only)
+.BR LD_TRACE_LOADED_OBJECTS " (ELF only)"
If set (to any value), causes the program to list its dynamic
dependencies, as if run by
.BR ldd (1),
@@ -330,24 +328,21 @@ instead of running normally.
Then there are lots of more or less obscure variables,
many obsolete or only for internal use.
.TP
-.B LD_AOUT_LIBRARY_PATH
-(libc5)
+.BR LD_AOUT_LIBRARY_PATH " (libc5)"
Version of
.B LD_LIBRARY_PATH
for a.out binaries only.
Old versions of ld\-linux.so.1 also supported
.BR LD_ELF_LIBRARY_PATH .
.TP
-.B LD_AOUT_PRELOAD
-(libc5)
+.BR LD_AOUT_PRELOAD " (libc5)"
Version of
.B LD_PRELOAD
for a.out binaries only.
Old versions of ld\-linux.so.1 also supported
.BR LD_ELF_PRELOAD .
.TP
-.B LD_AUDIT
-(glibc since 2.4)
+.BR LD_AUDIT " (glibc since 2.4)"
A colon-separated list of user-specified, ELF shared objects
to be loaded before all others in a separate linker namespace
(i.e., one that does not intrude upon the normal symbol bindings that
@@ -369,14 +364,12 @@ as described in its
in the chapter
.IR "Runtime Linker Auditing Interface" .
.TP
-.B LD_BIND_NOT
-(glibc since 2.1.95)
+.BR LD_BIND_NOT " (glibc since 2.1.95)"
If this environment variable is set to a nonempty string,
do not update the GOT (global offset table) and PLT (procedure linkage table)
after resolving a symbol.
.TP
-.B LD_DEBUG
-(glibc since 2.1)
+.BR LD_DEBUG " (glibc since 2.1)"
Output verbose debugging information about the dynamic linker.
If set to
.BR all ,
@@ -428,8 +421,7 @@ is ignored in secure-execution mode, unless the file
.IR /etc/suid\-debug
exists (the content of the file is irrelevant).
.TP
-.B LD_DEBUG_OUTPUT
-(glibc since 2.1)
+.BR LD_DEBUG_OUTPUT " (glibc since 2.1)"
File in which
.B LD_DEBUG
output should be written.
@@ -437,8 +429,7 @@ The default is standard error.
.B LD_DEBUG_OUTPUT
is ignored in secure-execution mode.
.TP
-.B LD_DYNAMIC_WEAK
-(glibc since 2.1.91)
+.BR LD_DYNAMIC_WEAK " (glibc since 2.1.91)"
If this environment variable is defined (with any value),
allow weak symbols to be overridden (reverting to old glibc behavior).
.\" See weak handling
@@ -452,22 +443,18 @@ Since glibc 2.3.4,
.B LD_DYNAMIC_WEAK
is ignored in secure-execution mode.
.TP
-.B LD_HWCAP_MASK
-(glibc since 2.1)
+.BR LD_HWCAP_MASK " (glibc since 2.1)"
Mask for hardware capabilities.
.TP
-.B LD_KEEPDIR
-(a.out only)(libc5)
+.BR LD_KEEPDIR " (a.out only; libc5)"
Don't ignore the directory in the names of a.out libraries to be loaded.
Use of this option is strongly discouraged.
.TP
-.B LD_NOWARN
-(a.out only)(libc5)
+.BR LD_NOWARN " (a.out only; libc5)"
Suppress warnings about a.out libraries with incompatible minor
version numbers.
.TP
-.B LD_ORIGIN_PATH
-(glibc since 2.1)
+.BR LD_ORIGIN_PATH " (glibc since 2.1)"
Path where the binary is found.
Since glibc 2.4,
.B LD_ORIGIN_PATH
@@ -475,8 +462,7 @@ is ignored in secure-execution mode.
.\" Only used if $ORIGIN can't be determined by normal means
.\" (from the origin path saved at load time, or from /proc/self/exe)?
.TP
-.B LD_POINTER_GUARD
-(glibc from 2.4 to 2.22)
+.BR LD_POINTER_GUARD " (glibc from 2.4 to 2.22)"
Set to 0 to disable pointer guarding.
Any other value enables pointer guarding, which is also the default.
Pointer guarding is a security mechanism whereby some pointers to code
@@ -492,15 +478,13 @@ Since glibc 2.23,
can no longer be used to disable pointer guarding,
which is now always enabled.
.TP
-.B LD_PROFILE
-(glibc since 2.1)
+.BR LD_PROFILE " (glibc since 2.1)"
The name of a (single) shared object to be profiled,
specified either as a pathname or a soname.
Profiling output is appended to the file whose name is:
"\fI$LD_PROFILE_OUTPUT\fP/\fI$LD_PROFILE\fP.profile".
.TP
-.B LD_PROFILE_OUTPUT
-(glibc since 2.1)
+.BR LD_PROFILE_OUTPUT " (glibc since 2.1)"
Directory where
.B LD_PROFILE
output should be written.
@@ -512,8 +496,7 @@ is ignored in secure-execution mode; instead
.IR /var/profile
is always used.
.TP
-.B LD_SHOW_AUXV
-(glibc since 2.1)
+.BR LD_SHOW_AUXV " (glibc since 2.1)"
If this environment variable is defined (with any value),
show the auxiliary array passed up from the kernel (see also
.BR getauxval (3)).
@@ -521,8 +504,7 @@ Since glibc 2.3.5,
.B LD_SHOW_AUXV
is ignored in secure-execution mode.
.TP
-.B LD_TRACE_PRELINKING
-(glibc since 2.4)
+.BR LD_TRACE_PRELINKING " (glibc since 2.4)"
If this environment variable is defined (with any value),
trace prelinking of the object whose name is assigned to
this environment variable.
@@ -552,20 +534,17 @@ is defined with the value 0,
neither executables nor PIEs will honor the base addresses.
This variable is ignored in secure-execution mode.
.TP
-.B LD_VERBOSE
-(glibc since 2.1)
+.BR LD_VERBOSE " (glibc since 2.1)"
If set to a nonempty string,
output symbol versioning information about the
program if the
.B LD_TRACE_LOADED_OBJECTS
environment variable has been set.
.TP
-.B LD_WARN
-(ELF only)(glibc since 2.1.3)
+.BR LD_WARN " (ELF only; glibc since 2.1.3)
If set to a nonempty string, warn about unresolved symbols.
.TP
-.B LD_PREFER_MAP_32BIT_EXEC
-(x86-64 only)(glibc since 2.23)
+.BR LD_PREFER_MAP_32BIT_EXEC " (x86-64 only; glibc since 2.23)"
According to the Intel Silvermont software optimization guide, for 64-bit
applications, branch prediction performance can be negatively impacted
when the target of a branch is more than 4GB away from the branch.
@@ -583,8 +562,7 @@ randomization (ASLR),
.B LD_PREFER_MAP_32BIT_EXEC
is always disabled in secure-execution mode.
.TP
-.B LDD_ARGV0
-(libc5)
+.BR LDD_ARGV0 " (libc5)"
.IR argv [0]
to be used by
.BR ldd (1)