Use of DT_RPATH is deprecated.
.IP o
Using the environment variable
-.BR LD_LIBRARY_PATH .
-Except if the executable is a set-user-ID/set-group-ID binary,
+.BR LD_LIBRARY_PATH
+(unless the executable is being run in secure-execution mode; see below).
in which case it is ignored.
.IP o
(ELF only) Using the directories specified in the
.BI \-\-inhibit\-rpath " list"
Ignore RPATH and RUNPATH information in object names in
.IR list .
-This option is ignored if
-.B ld.so
-is set-user-ID or set-group-ID.
+This option is ignored if when running in secure-execution mode (see below).
.TP
.BI \-\-audit " list"
Use objects named in
Similar to the
.B PATH
environment variable.
-Ignored in set-user-ID and set-group-ID programs.
+This variable is ignore in secure-execution mode.
.TP
.B LD_PRELOAD
A list of additional, user-specified, ELF shared
The items of the list can be separated by spaces or colons.
This can be used to selectively override functions in other shared objects.
The objects are searched for using the rules given under DESCRIPTION.
-For set-user-ID/set-group-ID ELF binaries,
+In secure-execution mode,
preload pathnames containing slashes are ignored,
and shared objects in the standard search directories are loaded
only if the set-user-ID mode bit is enabled on the shared object file.
would occur in the process).
These objects can be used to audit the operation of the dynamic linker.
.B LD_AUDIT
-is ignored for set-user-ID/set-group-ID binaries.
+is ignored in secure-execution mode.
The dynamic linker will notify the audit
shared objects at so-called auditing checkpoints\(emfor example,
environment variable.
Since glibc 2.3.4,
.B LD_DEBUG
-is ignored for set-user-ID/set-group-ID binaries.
+is ignored in secure-execution mode.
.TP
.B LD_DEBUG_OUTPUT
(glibc since 2.1)
output should be written.
The default is standard error.
.B LD_DEBUG_OUTPUT
-is ignored for set-user-ID/set-group-ID binaries.
+is ignored in secure-execution mode.
.TP
.B LD_DYNAMIC_WEAK
(glibc since 2.1.91)
.\" Reply-To: drepper at cygnus dot com (Ulrich Drepper)
For security reasons, since glibc 2.3.4,
.B LD_DYNAMIC_WEAK
-is ignored for set-user-ID/set-group-ID binaries.
+is ignored in secure-execution mode.
.TP
.B LD_HWCAP_MASK
(glibc since 2.1)
.B LD_ORIGIN_PATH
(glibc since 2.1)
Path where the binary is found (for non-set-user-ID programs).
-For security reasons, since glibc 2.4,
+Since glibc 2.4,
.B LD_ORIGIN_PATH
-is ignored for set-user-ID/set-group-ID binaries.
+is ignored in secure-execution mode.
.\" Only used if $ORIGIN can't be determined by normal means
.\" (from the origin path saved at load time, or from /proc/self/exe)?
.TP
then the default is
.IR /var/tmp .
.B LD_PROFILE_OUTPUT
-is ignored for set-user-ID and set-group-ID programs,
+is ignored in secure-execution mode.
which always use
.IR /var/profile .
.TP
.B LD_SHOW_AUXV
(glibc since 2.1)
Show auxiliary array passed up from the kernel.
-For security reasons, since glibc 2.3.5,
+Since glibc 2.3.5,
.B LD_SHOW_AUXV
-is ignored for set-user-ID/set-group-ID binaries.
+is ignored in secure-execution mode.
.TP
.B LD_TRACE_PRELINKING
(glibc since 2.4)
.B LD_USE_LOAD_BIAS
is defined with the value 0,
neither executables nor PIEs will honor the base addresses.
-This variable is ignored by set-user-ID and set-group-ID programs.
+This variable is ignored in secure-execution mode.
.TP
.B LD_VERBOSE
(glibc since 2.1)