aff1f4ab94
The following parameters are now available: * hardeningDisable To disable specific hardening flags * hardeningEnable To enable specific hardening flags Only the cc-wrapper supports this right now, but these may be reused by other wrappers, builders or setup hooks. cc-wrapper supports the following flags: * fortify * stackprotector * pie (disabled by default) * pic * strictoverflow * format * relro * bindnow |
||
---|---|---|
.. | ||
default.nix | ||
empty-dirs.patch | ||
etc-dirs.patch | ||
glibc-check.patch | ||
missing-functions.patch | ||
readlink-types.patch | ||
scandir.patch | ||
set-buildroot.patch | ||
use-old-memcpy.patch |