The following parameters are now available:
* hardeningDisable
To disable specific hardening flags
* hardeningEnable
To enable specific hardening flags
Only the cc-wrapper supports this right now, but these may be reused by
other wrappers, builders or setup hooks.
cc-wrapper supports the following flags:
* fortify
* stackprotector
* pie (disabled by default)
* pic
* strictoverflow
* format
* relro
* bindnow
9 lines
231 B
Nix
9 lines
231 B
Nix
{ stdenv, fetchurl, ... } @ args:
|
|
|
|
import ./generic.nix (args // rec {
|
|
version = "4.7.25";
|
|
sha256 = "0gi667v9cw22c03hddd6xd6374l0pczsd56b7pba25c9sdnxjkzi";
|
|
branch = "4.7";
|
|
drvArgs = { hardeningDisable = [ "format" ]; };
|
|
})
|