aff1f4ab94
The following parameters are now available: * hardeningDisable To disable specific hardening flags * hardeningEnable To enable specific hardening flags Only the cc-wrapper supports this right now, but these may be reused by other wrappers, builders or setup hooks. cc-wrapper supports the following flags: * fortify * stackprotector * pie (disabled by default) * pic * strictoverflow * format * relro * bindnow
32 lines
731 B
Nix
32 lines
731 B
Nix
{ stdenv, fetchzip, kernel }:
|
|
|
|
let
|
|
sourceAttrs = (import ./source.nix) { inherit fetchzip; };
|
|
in
|
|
|
|
stdenv.mkDerivation {
|
|
name = "jool-${sourceAttrs.version}-${kernel.version}";
|
|
|
|
src = sourceAttrs.src;
|
|
|
|
hardeningDisable = [ "pic" ];
|
|
|
|
prePatch = ''
|
|
sed -e 's@/lib/modules/\$(.*)@${kernel.dev}/lib/modules/${kernel.modDirVersion}@' -i mod/*/Makefile
|
|
'';
|
|
|
|
buildPhase = ''
|
|
make -C mod
|
|
'';
|
|
|
|
installPhase = ''
|
|
make -C mod modules_install INSTALL_MOD_PATH=$out
|
|
'';
|
|
|
|
meta = with stdenv.lib; {
|
|
homepage = https://www.jool.mx/;
|
|
description = "Fairly compliant SIIT and Stateful NAT64 for Linux - kernel modules";
|
|
platforms = platforms.linux;
|
|
maintainers = with maintainers; [ fpletz ];
|
|
};
|
|
}
|