aff1f4ab94
The following parameters are now available: * hardeningDisable To disable specific hardening flags * hardeningEnable To enable specific hardening flags Only the cc-wrapper supports this right now, but these may be reused by other wrappers, builders or setup hooks. cc-wrapper supports the following flags: * fortify * stackprotector * pie (disabled by default) * pic * strictoverflow * format * relro * bindnow |
||
---|---|---|
.. | ||
4.3 | ||
4.4 | ||
4.5 | ||
4.6 | ||
4.8 | ||
4.9 | ||
5 | ||
builder.sh | ||
gfortran-darwin-NXConstStr.patch | ||
gfortran-darwin.nix | ||
gfortran-darwin.patch | ||
gfortran-driving.patch | ||
gnat-cflags.patch | ||
libstdc++-target.patch | ||
no-sys-dirs.patch | ||
parallel-bconfig.patch | ||
use-source-date-epoch.patch |