aff1f4ab94
The following parameters are now available: * hardeningDisable To disable specific hardening flags * hardeningEnable To enable specific hardening flags Only the cc-wrapper supports this right now, but these may be reused by other wrappers, builders or setup hooks. cc-wrapper supports the following flags: * fortify * stackprotector * pie (disabled by default) * pic * strictoverflow * format * relro * bindnow
9 lines
298 B
Nix
9 lines
298 B
Nix
{ stdenv, fetchurl, ... } @ args:
|
|
|
|
import ./generic.nix (args // rec {
|
|
version = "4.5.20";
|
|
extraPatches = [ ./cygwin-4.5.patch ./register-race-fix.patch ];
|
|
sha256 = "0bd81k0qv5i8w5gbddrvld45xi9k1gvmcrfm0393v0lrm37dab7m";
|
|
branch = "4.5";
|
|
drvArgs = { hardeningDisable = [ "format" ]; };
|
|
})
|