diff options
author | Pierre Labastie <pierre.labastie@neuf.fr> | 2022-10-18 09:59:00 +0200 |
---|---|---|
committer | Pierre Labastie <pierre.labastie@neuf.fr> | 2022-10-18 10:43:10 +0200 |
commit | b00c7d9905aaf0ae3a6cc2cb19f2bc02057e640f (patch) | |
tree | 399a1e69dc9fd2d3dc3e67ad08b6212fcd613c74 /chapter01 | |
parent | 0f9c02a9bfe70b119c5456f8a9019f9fb725e58c (diff) |
Clarify why pie might be disabled
Just reading a textbook and LFS does not imply anything for compilation...
Diffstat (limited to 'chapter01')
-rw-r--r-- | chapter01/whatsnew.xml | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/chapter01/whatsnew.xml b/chapter01/whatsnew.xml index b36765261..5d246c861 100644 --- a/chapter01/whatsnew.xml +++ b/chapter01/whatsnew.xml @@ -14,10 +14,10 @@ <para>In the 11.3 release, <parameter>--enable-default-pie</parameter> and <parameter>--enable-default-ssp</parameter> are enabled for GCC. These techniques can mitigate some malicious attacks, but they do not provide - perfect security. If you are reading LFS and a programming textbook, + perfect security. Note that some textbooks assume these options are + disabled, so that if you run examples from such a textbook on an LFS system, you may need to disable PIE and SSP with the GCC options - <parameter>-fno-pie -no-pie -fno-stack-protection</parameter>, - because some textbooks assume these options are disabled by default.</para> + <parameter>-fno-pie -no-pie -fno-stack-protection</parameter>.</para> <para>Here is a list of the packages updated since the previous release of LFS.</para> |