aff1f4ab94
The following parameters are now available: * hardeningDisable To disable specific hardening flags * hardeningEnable To enable specific hardening flags Only the cc-wrapper supports this right now, but these may be reused by other wrappers, builders or setup hooks. cc-wrapper supports the following flags: * fortify * stackprotector * pie (disabled by default) * pic * strictoverflow * format * relro * bindnow |
||
---|---|---|
.. | ||
arduino | ||
compilers | ||
coq-modules | ||
dotnet-modules/patches | ||
eclipse | ||
erlang-modules | ||
go-modules | ||
guile-modules | ||
haskell-modules | ||
idris-modules | ||
interpreters | ||
libraries | ||
lisp-modules | ||
lua-modules | ||
misc | ||
mobile | ||
ocaml-modules | ||
perl-modules | ||
pharo | ||
pure-modules | ||
python-modules | ||
qtcreator | ||
r-modules | ||
ruby-modules | ||
tools | ||
web |