hardened-config: build with fortify source

Changed files
+5
pkgs
os-specific
linux
+5
pkgs/os-specific/linux/kernel/hardened-config.nix
···
# Use -fstack-protector-strong (gcc 4.9+) for best stack canary coverage.
CC_STACKPROTECTOR_REGULAR n
CC_STACKPROTECTOR_STRONG y
+
+
# Enable compile/run-time buffer overflow detection ala glibc's _FORTIFY_SOURCE
+
${optionalString (versionAtLeast version "4.13") ''
+
FORTIFY_SOURCE y
+
''}
''