aff1f4ab94
The following parameters are now available: * hardeningDisable To disable specific hardening flags * hardeningEnable To enable specific hardening flags Only the cc-wrapper supports this right now, but these may be reused by other wrappers, builders or setup hooks. cc-wrapper supports the following flags: * fortify * stackprotector * pie (disabled by default) * pic * strictoverflow * format * relro * bindnow |
||
---|---|---|
.. | ||
apulse | ||
beep | ||
cups | ||
drivers | ||
emulators | ||
foldingathome | ||
freestyle | ||
frescobaldi | ||
ghostscript | ||
gnuk | ||
jackaudio | ||
lilypond | ||
mxt-app | ||
my-env | ||
phabricator | ||
sails | ||
screensavers | ||
seafile-shared | ||
solfege | ||
sound-of-sorting | ||
source-and-tags | ||
talkfilters | ||
themes | ||
uboot | ||
urbit | ||
vim-plugins | ||
xosd | ||
misc.nix |