X-Git-Url: https://ruderich.org/simon/gitweb/?a=blobdiff_plain;f=src%2Fcoloredstderr.c;h=cc588836817b4dfaad26713b7a3b24f77c145cff;hb=04ac66863a96d0c80bd00cc02bc3ab1e6aa8a620;hp=eae164dd93d168856440fbfbf09209cdd94eb60b;hpb=7c2d726cd4c2716e9c211b5a5ab5d7713e1dfc5e;p=coloredstderr%2Fcoloredstderr.git diff --git a/src/coloredstderr.c b/src/coloredstderr.c index eae164d..cc58883 100644 --- a/src/coloredstderr.c +++ b/src/coloredstderr.c @@ -38,6 +38,11 @@ /* Conflicting declaration in glibc. */ #undef fwrite_unlocked +/* These functions may be macros when compiling with hardening flags (fortify) + * which cause build failures when used in our hook macros below. Observed + * with Clang on Debian Wheezy. */ +#undef printf +#undef fprintf /* Used by various functions, including debug(). */ @@ -530,9 +535,19 @@ int execv(char const *path, char * const argv[]) { } static int (*real_execvp)(char const *path, char * const argv[]); -int execvp(char const *path, char * const argv[]) { +int execvp(char const *file, char * const argv[]) { DLSYM_FUNCTION(real_execvp, "execvp"); update_environment(); - return real_execvp(path, argv); + return real_execvp(file, argv); } + +#ifdef HAVE_EXECVPE +extern char **environ; +int execvpe(char const *file, char * const argv[], char * const envp[]) { + /* Fake the environment so we can reuse execvp(). */ + environ = (char **)envp; + + return execvp(file, argv); +} +#endif