Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
michael@0 | 1 | # Copyright (c) 2011 The Chromium Authors. All rights reserved. |
michael@0 | 2 | # Use of this source code is governed by a BSD-style license that can be |
michael@0 | 3 | # found in the LICENSE file. |
michael@0 | 4 | { |
michael@0 | 5 | 'includes': ['release_defaults.gypi'], |
michael@0 | 6 | 'msvs_settings': { |
michael@0 | 7 | 'VCCLCompilerTool': { |
michael@0 | 8 | 'OmitFramePointers': 'false', |
michael@0 | 9 | # The above is not sufficient (http://crbug.com/106711): it |
michael@0 | 10 | # simply eliminates an explicit "/Oy", but both /O2 and /Ox |
michael@0 | 11 | # perform FPO regardless, so we must explicitly disable. |
michael@0 | 12 | # We still want the false setting above to avoid having |
michael@0 | 13 | # "/Oy /Oy-" and warnings about overriding. |
michael@0 | 14 | 'AdditionalOptions': ['/Oy-'], |
michael@0 | 15 | }, |
michael@0 | 16 | }, |
michael@0 | 17 | } |