Commit Graph

8304 Commits

Author SHA1 Message Date
Xi Ruoyao
e4c6597593
groff: add back "build the package"
It was removed unintentionally during the removal of -j1...
2022-09-14 12:19:50 +08:00
Xi Ruoyao
2e9e5b43c5
add <literal> to make commands for temp /etc/hosts and final /etc/pip3.conf looking better 2022-09-14 11:52:01 +08:00
Bruce Dubbs
95789f1ae4 Minor wording change. 2022-09-13 12:49:26 -05:00
Xi Ruoyao
395eb462ba
bash: document egrep warnings in tests
The test suite says "Any output from any test, unless otherwise noted,
indicates a possible anomaly".  So we should note those warnings.
2022-09-14 01:34:15 +08:00
Xi Ruoyao
2844cded1c
libtool: document test failures related to grep-3.8 2022-09-14 01:32:24 +08:00
Xi Ruoyao
36c4562187
ncurses: mention libncurses++w in contents 2022-09-14 00:15:12 +08:00
Xi Ruoyao
951e07508b
ncurses: remove an outdated sentence about libncurses++w.a
We now build the C++ binding as shared library.
2022-09-14 00:08:40 +08:00
Xi Ruoyao
0d487e09e6
gcc: update sanity check command and output for default PIE
Scrt1.o is used for PIE, instead of crt1.o.
2022-09-14 00:03:45 +08:00
Xi Ruoyao
fb5ad92588
gcc: document that libssp is normally unused
We are enabling default SSP now, so if someone runs "ldd /usr/bin/true"
and see libssp is not used he/she may be puzzled.
2022-09-13 17:59:05 +08:00
Pierre Labastie
8a16c6b4ec Restore gawk to working version
Revert an inadvertent commit, sorry
2022-09-13 09:34:50 +02:00
Xi Ruoyao
9d3ba7b850
vim: no need to download spell files
They are already in the tarball, so just install them if needed.
2022-09-12 21:02:48 +08:00
Pierre Labastie
e5e442cd32 Typo in a comment 2022-09-11 19:02:41 +02:00
Pierre Labastie
7bd0378b41 Remove trailing spaces 2022-09-11 18:54:49 +02:00
Pierre Labastie
c37e846f4b Replace tabs with spaces 2022-09-11 18:42:58 +02:00
Pierre Labastie
84e1bb6b85 Update changelog for PIE/SSP in GCC 2022-09-11 10:55:25 +02:00
Pierre Labastie
63c2e8bb66 Comment on binutils test failures with pie/ssp 2022-09-11 10:55:25 +02:00
Xi Ruoyao
c10a327376
gcc: fix link to PIE & SSP note
DocBook does not handle xref to note properly (#pie-ssp-info not
generated).
2022-09-11 13:57:47 +08:00
Xi Ruoyao
e5aa02fe17
kernel: enable ASLR and SSP
It does not make too much sense to protect the userspace with PIE+ASLR
and SSP but leave the kernel alone...
2022-09-11 12:09:18 +08:00
Xi Ruoyao
a710d35e1f
Revert "linux kernel: disable CONFIG_USERFAULTFD to avoid CVE-2022-2590 for now"
This reverts commit 098f4de336.

CVE-2022-2590 is fixed in Linux >= 5.19.6.
2022-09-11 12:01:31 +08:00
Xi Ruoyao
e502de1ab0
gcc: some reword of PIE/SSP/ASLR note
Expand tabs to 8 spaces like everywhere else in the book.

Explain that shared libraries are already covered by ASLR, PIE expands
the ASLR to cover the exetutables.

In 2022, stack smashing attackings are mostly constructing a sequence of
faked returning addresses to exectute a series of function already
existing in the programs or libraries itself (ret2lib).  Returning into
the code injected by the attacker is almost impossible because on
i686 (with a PAE/NX enabled kernel) or x86_64, running injected code
needs W/X mappings and those are very rare these days.
2022-09-11 11:35:06 +08:00
Pierre Labastie
8d3b2541da gcc-pass1: fix bold "and" in command explanation 2022-09-10 14:01:42 +02:00
Pierre Labastie
1bade3f439 Document the --enable-default-pie/ssp options
Also document test failures in gcc chapter 8
2022-09-10 13:41:38 +02:00
Pierre Labastie
0611f706d5 Use default-pie and default-ssp flags in gcc
Committing only the commands for now, so that others can test the
build. TODO:
- add command explanations
- add changelog
- comment on failing tests in binutils and gcc
2022-09-09 16:15:06 +02:00
Bruce Dubbs
917868fc69 Package Updates.
Update to shadow-4.12.3.
Update to Python3-3.10.7.
Update to linux-5.19.7.
Update to less-608.
Update to grep-3.8.
2022-09-07 14:59:45 -05:00
Xi Ruoyao
696a7b4a83
whatnow: update online resources list for maintainance
Bugtraq is dead since 2021, use oss-sec instead.

For CERT, cert.org redirects to CMU and us-cert.gov redirects to US
CISA (https://www.cisa.gov/uscert/).  I'm not familiar with those so
left those for a US citizen to add :).
2022-09-05 10:04:33 +08:00
Xi Ruoyao
fb66c4c583
some http -> https changes 2022-09-05 09:52:05 +08:00
Xi Ruoyao
baecd49c48
gcc-pass2: remove unnecessary --enable-initfini-array option
Forgot to remove this one when I removed it in pass 1...

Reference: https://gcc.gnu.org/r12-1328
2022-09-01 14:04:34 +08:00
Xi Ruoyao
7b3f5a4f8d
groff: remove -j1 2022-09-01 14:04:34 +08:00
Pierre Labastie
51b7349a97 Remove all non header files in linux headers
Report by Joe Locash that a perl script was left in /usr/include
with our current instructions
2022-08-31 21:34:49 +02:00
Bruce Dubbs
b877b48a51 Clean up after 11.2 2022-08-31 14:12:10 -05:00
Xi Ruoyao
cfaf7273f8
parition: mention EFI system partition
Text only change.  Simply refer to BLFS.
2022-08-28 20:06:00 +08:00
Xi Ruoyao
bf6f9e75ee
python: supress "failed to check new pip version" or "a new pip version is available" warnings
The non-text change during freeze is approved by bdubbs.
2022-08-26 23:52:18 +08:00
Xi Ruoyao
5353a1948f
grub: add a note about filesystem UUID and partition UUID usage
Text only change.
2022-08-26 20:30:29 +08:00
Xi Ruoyao
d84087141c
reboot: mention firmwares
Text only change.

I've forgotten this several times for AMDGPU...
2022-08-26 19:52:20 +08:00
Xi Ruoyao
e9d65f2f4c
grub: update description for grub-glue-efi
Text only change.

Found out this utility also exists on ARM, so copied "grub-glue-efi
--help" here, which does not mention "ia32" or "amd64".
2022-08-26 19:47:50 +08:00
Pierre Labastie
b3f157c685 Don't use dummy.c for glibc sanity check in chap 5
It seems glibc creates dummy.c for its own use. This leaves some
dummy.xxx files in the directory, that may lead some users to think that
the directory is not properly cleaned up after the test (I did :)

So use a pipe so that only a.out is created
2022-08-25 09:24:58 +02:00
Xi Ruoyao
feed7fea36
linux kernel: reword description for CONFIG_X86_X2APIC 2022-08-25 01:05:55 +08:00
Xi Ruoyao
85cdcb0980
glibc: don't mention "/lib" as ld.so search path anymore
Text change only.

Since 11.0, /lib is a symlink to usr/lib.  With libc_cv_slibdir=/usr/lib,
/lib won't be searched by default anymore (if someone mess up the system
by removing /lib symlink and create an real directory there, for example
the initramfs before r10.1-439).
2022-08-24 23:42:27 +08:00
Xi Ruoyao
098f4de336
linux kernel: disable CONFIG_USERFAULTFD to avoid CVE-2022-2590 for now 2022-08-24 16:42:49 +08:00
Xi Ruoyao
83b86449a1
linux kernel: enable CONFIG_X86_X2APIC
It's recommended for CVE-2022-21233 mitigation.  And, if the BIOS has
enabled x2APIC but CONFIG_X86_X2APIC=n, the kernel will panic on boot.

If x2APIC is disabled or not available, the kernel with
CONFIG_X86_X2APIC=y can still boot normally.

No need to tag anything again because interrupt handling cannot affect
userspace.
2022-08-24 16:42:48 +08:00
Xi Ruoyao
20007e51c2
glibc: update test status
Text change only.

Add tst-arc4random-thread failure recently reported to upstream, remove
namespace related failures as they are UNSUPPORTED now in 2.36.
2022-08-23 18:43:10 +08:00
Xi Ruoyao
ec3cad45c3
mark linux-5.19.2 and shadow-4.12.2 as security fix 2022-08-22 11:17:46 +08:00
Bruce Dubbs
fd6f71bd35 Update SBU times and disk usage for all packages 2022-08-21 12:00:34 -05:00
Bruce Dubbs
a7a9d696fc Minor updates 2022-08-21 10:04:47 -05:00
Douglas R. Reno
8996c54f21 Update stats for systemd packages in preparation of 11.2-rc1 2022-08-21 08:36:00 -05:00
Xi Ruoyao
942e81de78
stripping: also mention symbol table bisides debug symbols 2022-08-21 20:27:28 +08:00
Xi Ruoyao
983647975b
shadow: fix download URL 2022-08-21 14:10:56 +08:00
Xi Ruoyao
3a1168d937
add changelog entries for last package update 2022-08-21 14:05:48 +08:00
Bruce Dubbs
f2af13d7a0 Intermediate update prior to lfs-11.2-rc1 2022-08-20 10:35:01 -05:00
Xi Ruoyao
6099a47149
Remove libtool archive (.la) files in Chapter 5 and 6
They are really harmful.  In Binutils pass 2, libstdc++.la caused the
building system to use host /usr/lib/libstdc++.so for gprofng.  We now
has disabled gprofng for pass 2, but the similar issue also exists in
GCC pass 2.  In a normal LFS build, the building system silently uses
/usr/lib/libstdc++.so (I guess it does not blow up simply because some
blind luck); in a real cross build (x86 -> ARM for example) the build
will fail.

Remove the .la files to fix this issue.  Instead of only modifying
clfs-ng, it makes more sense to apply the change for trunk: though
the build does not fail, using host library is still a contamination.
2022-08-19 12:41:48 +08:00