|Main index||Section 1||日本語||Options|
After all shared libraries have been successfully loaded, ld-elf.so.1 proceeds to resolve external references from both the main program and all objects loaded. A mechanism is provided for initialization routines to be called on a per-object basis, giving a shared object an opportunity to perform any extra set-up before execution of the program proper begins. This is useful for C++ libraries that contain static constructors.
When resolving dependencies for the loaded objects,
translates dynamic token strings in rpath and soname.
|$ORIGIN||Translated to the full path of the loaded object.|
|$OSNAME||Translated to the name of the operating system implementation.|
|$OSREL||Translated to the release level of the operating system.|
|Translated to the machine hardware platform.|
The ld-elf.so.1 utility itself is loaded by the kernel together with any dynamically-linked program that is to be executed. The kernel transfers control to the dynamic linker. After the dynamic linker has finished loading, relocating, and initializing the program and its required shared objects, it transfers control to the entry point of the program. The following search order is used to locate required shared objects:
The ld-elf.so.1 utility recognizes a number of environment variables that can be used to modify its behaviour. On 64-bit architectures, the linker for 32-bit objects recognizes all the environment variables listed below, but is being prefixed with LD_32_, for example: LD_32_TRACE_LOADED_OBJECTS.
|LD_DUMP_REL_POST||If set, ld-elf.so.1 will print a table containing all relocations after symbol binding and relocation.|
|LD_DUMP_REL_PRE||If set, ld-elf.so.1 will print a table containing all relocations before symbol binding and relocation.|
|LD_LIBMAP||A library replacement list in the same format as libmap.conf(5). For convenience, the characters ‘=’ and ‘,’ can be used instead of a space and a newline. This variable is parsed after libmap.conf(5), and will override its entries. This variable is unset for set-user-ID and set-group-ID programs.|
|If set, disables the use of libmap.conf(5) and LD_LIBMAP. This variable is unset for set-user-ID and set-group-ID programs.|
|This variable will override the default location of "hints" file. This variable is unset for set-user-ID and set-group-ID programs.|
|LD_LIBRARY_PATH||A colon separated list of directories, overriding the default search path for shared libraries. This variable is unset for set-user-ID and set-group-ID programs.|
If the variable is specified and has a value starting with
any of y, Y or 1 symbols, the path specified by
variable is allowed to override the path from
for binaries which does not contain
For such binaries, when the variable
|LD_PRELOAD||A list of shared libraries, separated by colons and/or white space, to be linked in before any other shared libraries. If the directory is not specified then the directories specified by LD_LIBRARY_PATH will be searched first followed by the set of built-in standard directories. This variable is unset for set-user-ID and set-group-ID programs.|
|A colon separated list of file descriptor numbers for library directories. This is intended for use within capsicum(4) sandboxes, when global namespaces such as the filesystem are unavailable. It is consulted just after LD_LIBRARY_PATH. This variable is unset for set-user-ID and set-group-ID programs.|
|LD_BIND_NOT||When set to a nonempty string, prevents modifications of the PLT slots when doing bindings. As result, each call of the PLT-resolved function is resolved. In combination with debug output, this provides complete account of all bind actions at runtime. This variable is unset for set-user-ID and set-group-ID programs.|
|LD_BIND_NOW||When set to a nonempty string, causes ld-elf.so.1 to relocate all external function calls before starting execution of the program. Normally, function calls are bound lazily, at the first call of each function. LD_BIND_NOW increases the start-up time of a program, but it avoids run-time surprises caused by unexpectedly undefined functions.|
|When set to a nonempty string, causes ld-elf.so.1 to exit after loading the shared objects and printing a summary which includes the absolute pathnames of all objects, to standard output.|
|When set to a nonempty string, causes ld-elf.so.1 to expand the summary to indicate which objects caused each object to be loaded.|
When set, these variables are interpreted as format strings a la
to customize the trace output and are used by
|%a||The main program's name (also known as "__progname").|
|%A||The value of the environment variable LD_TRACE_LOADED_OBJECTS_PROGNAME. Typically used to print both the names of programs and shared libraries being inspected using ldd(1).|
|%o||The library name.|
|%p||The full pathname as determined by rtld library search rules.|
|%x||The library's load address.|
Additionally, ‘\n’ and ‘\t’ are recognized and have their usual meaning.
|If set, ld-elf.so.1 will log events such as the loading and unloading of shared objects via utrace(2).|
|If set, ld-elf.so.1 will process the filtee dependencies of the loaded objects immediately, instead of postponing it until required. Normally, the filtees are opened at the time of the first symbol resolution from the filter object.|
The syntax of the direct invocation is
The options are:
|Use the executable exe instead of image_path for activation. If this option is specified, image_path is only used to provide the argv value to the program.|
|File descriptor fd references the binary to be activated by ld-elf.so.1. It must already be opened in the process when executing ld-elf.so.1. If this option is specified, image_path is only used to provide the argv value to the program.|
|If the image_path argument specifies a name which does not contain a slash "/" character, ld-elf.so.1 uses the search path provided by the environment variable PATH to find the binary to execute.|
|Display information about this run-time linker binary, then exit.|
The argument following
In the direct execution mode, ld-elf.so.1 emulates verification of the binary execute permission for the current user. This is done to avoid breaking user expectations in naively restricted execution environments. The verification only uses Unix DACs, ignores ACLs, and is naturally prone to race conditions. Environments which rely on such restrictions are weak and breakable on their own.
To solve the problem, ld-elf.so.1 exports some feature indicators in the FreeBSD private symbols namespace FBSDprivate_1.0. Symbols start with the _rtld_version prefix. Current list of defined symbols and corresponding features is:
|Symbol exports the value of the __FreeBSD_version definition as it was provided during the ld-elf.so.1 build. The symbol is always present since the _rtld_version facility was introduced.|
member of the
structure contains the load offset of the shared object.
contained the base address of the library.
Also it indicates the presence of l_refname member of the structure.
|Hints file for 32-bit binaries on 64-bit system.|
|/etc/libmap.conf||The libmap configuration file.|
|/etc/libmap32.conf||The libmap configuration file for 32-bit binaries on 64-bit system.|
|RTLD (1)||June 1, 2020|
|Main index||Section 1||日本語||Options|
|“||The most important thing in the programming language is the name. A language will not succeed without a good name. I have recently invented a very good name and now I am looking for a suitable language.||”|
|— Donald Knuth|