328 lines
13 KiB
Diff
328 lines
13 KiB
Diff
Index: chromium-141.0.7354.0/build/config/compiler/BUILD.gn
|
|
===================================================================
|
|
--- chromium-141.0.7354.0.orig/build/config/compiler/BUILD.gn
|
|
+++ chromium-141.0.7354.0/build/config/compiler/BUILD.gn
|
|
@@ -341,9 +341,7 @@ config("compiler") {
|
|
|
|
configs += [
|
|
# See the definitions below.
|
|
- ":clang_revision",
|
|
":rustc_revision",
|
|
- ":compiler_cpu_abi",
|
|
":compiler_codegen",
|
|
":compiler_deterministic",
|
|
":clang_warning_suppression",
|
|
@@ -638,64 +636,6 @@ config("compiler") {
|
|
ldflags += [ "-Wl,-z,keep-text-section-prefix" ]
|
|
}
|
|
|
|
- if (is_clang) {
|
|
- cflags += [ "-fcrash-diagnostics-dir=" + clang_diagnostic_dir ]
|
|
- if (save_reproducers_on_lld_crash && use_lld) {
|
|
- ldflags += [
|
|
- "-fcrash-diagnostics=all",
|
|
- "-fcrash-diagnostics-dir=" + clang_diagnostic_dir,
|
|
- ]
|
|
- }
|
|
-
|
|
- # TODO(hans): Remove this once Clang generates better optimized debug info
|
|
- # by default. https://crbug.com/765793
|
|
- cflags += [
|
|
- "-mllvm",
|
|
- "-instcombine-lower-dbg-declare=0",
|
|
- ]
|
|
- if (!is_debug && use_thin_lto && is_a_target_toolchain) {
|
|
- if (is_win) {
|
|
- ldflags += [ "-mllvm:-instcombine-lower-dbg-declare=0" ]
|
|
- } else {
|
|
- ldflags += [ "-Wl,-mllvm,-instcombine-lower-dbg-declare=0" ]
|
|
- }
|
|
- }
|
|
-
|
|
- # TODO(crbug.com/40283598): This causes binary size growth and potentially
|
|
- # other problems.
|
|
- # TODO(crbug.com/40284925): This isn't supported by Cronet's mainline llvm version.
|
|
- if (default_toolchain != "//build/toolchain/cros:target" &&
|
|
- !llvm_android_mainline) {
|
|
- cflags += [
|
|
- "-mllvm",
|
|
- "-split-threshold-for-reg-with-hint=0",
|
|
- ]
|
|
- if (use_thin_lto && is_a_target_toolchain) {
|
|
- if (is_win) {
|
|
- ldflags += [ "-mllvm:-split-threshold-for-reg-with-hint=0" ]
|
|
- } else {
|
|
- ldflags += [ "-Wl,-mllvm,-split-threshold-for-reg-with-hint=0" ]
|
|
- }
|
|
- }
|
|
- }
|
|
-
|
|
- # TODO(crbug.com/40192287): Investigate why/if this should be needed.
|
|
- if (is_win) {
|
|
- cflags += [ "/clang:-ffp-contract=off" ]
|
|
- } else {
|
|
- cflags += [ "-ffp-contract=off" ]
|
|
- }
|
|
-
|
|
- # Enable ELF CREL (see crbug.com/357878242) for all platforms that use ELF.
|
|
- # TODO(crbug.com/376278218): This causes segfault on Linux ARM builds.
|
|
- # It also causes segfault on Linux s390x:
|
|
- # https://github.com/llvm/llvm-project/issues/149511
|
|
- if (is_linux && use_lld && !llvm_android_mainline && current_cpu != "arm" &&
|
|
- current_cpu != "s390x") {
|
|
- cflags += [ "-Wa,--crel,--allow-experimental-crel" ]
|
|
- }
|
|
- }
|
|
-
|
|
# C11/C++11 compiler flags setup.
|
|
# ---------------------------
|
|
if (is_linux || is_chromeos || is_android || current_os == "aix") {
|
|
@@ -1646,43 +1586,6 @@ config("compiler_deterministic") {
|
|
}
|
|
}
|
|
|
|
- # Makes builds independent of absolute file path.
|
|
- if (is_clang && strip_absolute_paths_from_debug_symbols) {
|
|
- # If debug option is given, clang includes $cwd in debug info by default.
|
|
- # For such build, this flag generates reproducible obj files even we use
|
|
- # different build directory like "out/feature_a" and "out/feature_b" if
|
|
- # we build same files with same compile flag.
|
|
- # Other paths are already given in relative, no need to normalize them.
|
|
-
|
|
- # -ffile-compilation-dir is an alias for both -fdebug-compilation-dir=
|
|
- # and -fcoverage-compilation-dir=.
|
|
- cflags += [ "-ffile-compilation-dir=." ]
|
|
-
|
|
- # Convert absolute paths to relative paths. Expands to, for example:
|
|
- # -file-prefix-map /path/to/chromium/src=../..
|
|
- swiftflags += [
|
|
- "-file-prefix-map",
|
|
- rebase_path("//.", "") + "=" + rebase_path("//.", root_build_dir),
|
|
- ]
|
|
- if (!is_win) {
|
|
- # We don't use clang -cc1as on Windows (yet? https://crbug.com/762167)
|
|
- asmflags = [ "-Wa,-fdebug-compilation-dir,." ]
|
|
- }
|
|
-
|
|
- if (is_win && use_lld) {
|
|
- if (symbol_level == 2 || (is_clang && using_sanitizer)) {
|
|
- # Absolutize source file paths for PDB. Pass the real build directory
|
|
- # if the pdb contains source-level debug information and if linker
|
|
- # reproducibility is not critical.
|
|
- ldflags += [ "/PDBSourcePath:" + rebase_path(root_build_dir) ]
|
|
- } else {
|
|
- # Use a fake fixed base directory for paths in the pdb to make the pdb
|
|
- # output fully deterministic and independent of the build directory.
|
|
- ldflags += [ "/PDBSourcePath:o:\fake\prefix" ]
|
|
- }
|
|
- }
|
|
- }
|
|
-
|
|
# Tells the compiler not to use absolute paths when passing the default
|
|
# paths to the tools it invokes. We don't want this because we don't
|
|
# really need it and it can mess up the RBE cache entries.
|
|
@@ -1709,87 +1612,6 @@ config("compiler_deterministic") {
|
|
}
|
|
}
|
|
|
|
-config("clang_revision") {
|
|
- if (is_clang && clang_base_path == default_clang_base_path &&
|
|
- current_os != "zos") {
|
|
- _perform_consistency_checks = current_toolchain == default_toolchain
|
|
- if (llvm_force_head_revision) {
|
|
- _head_revision_stamp_path = "//third_party/llvm-build/force_head_revision"
|
|
- _head_revision = ""
|
|
- if (path_exists(_head_revision_stamp_path)) {
|
|
- _head_revision = read_file(_head_revision_stamp_path, "trim string")
|
|
- }
|
|
- assert(
|
|
- _head_revision != "",
|
|
- "llvm_force_head_revision=true, but no locally built version was detected.")
|
|
- _clang_revision = _head_revision
|
|
- } else {
|
|
- _clang_revision = read_file(
|
|
- "//third_party/llvm-build/Release+Asserts/cr_build_revision",
|
|
- "trim string")
|
|
-
|
|
- # Ensure that the synced clang version matches what's in git.
|
|
- if (_perform_consistency_checks) {
|
|
- # Parse the clang version from the Python script.
|
|
- _clang_version_lines = filter_include(
|
|
- read_file("//tools/clang/scripts/update.py", "list lines"),
|
|
- [ "CLANG_*REVISION = *" ])
|
|
- _py_revision =
|
|
- string_replace(_clang_version_lines[0], "CLANG_REVISION = '", "")
|
|
- _py_revision = string_replace(_py_revision, "'", "")
|
|
- _py_subrevision =
|
|
- string_replace(_clang_version_lines[1], "CLANG_SUB_REVISION = ", "")
|
|
- _expected_clang_revision = "$_py_revision-$_py_subrevision"
|
|
-
|
|
- # TODO(agrieve): Change filter_include to _clang_revision ==
|
|
- # _expected_clang_revision once angle & webrtc use a GCS DEPS entry
|
|
- # rather than a update.py runhook.
|
|
- assert(
|
|
- filter_include([ _clang_revision ],
|
|
- [
|
|
- _expected_clang_revision,
|
|
- "$_expected_clang_revision,*",
|
|
- ]) != [],
|
|
- "clang_revision=\"$_clang_revision\" but update.py expected \"$_expected_clang_revision\". Did you forget to gclient sync?")
|
|
- }
|
|
- }
|
|
-
|
|
- if (_perform_consistency_checks) {
|
|
- # Ensure that the revision matches the version major expected by GN.
|
|
- _versions_match = filter_include([ _clang_revision ],
|
|
- [ "llvmorg-$clang_version-*" ]) != []
|
|
- assert(
|
|
- _versions_match,
|
|
- "clang_revision=\"$_clang_revision\" but clang_version=\"$clang_version\". clang_version in build/toolchain/toolchain.gni is likely outdated.")
|
|
- }
|
|
-
|
|
- if (toolchain_has_rust && _perform_consistency_checks) {
|
|
- # Ensure that the synced rust version matches what's in git.
|
|
- _rust_revision_lines =
|
|
- filter_include(read_file("//tools/rust/update_rust.py", "list lines"),
|
|
- [ "RUST_*REVISION = *" ])
|
|
- _py_revision =
|
|
- string_replace(_rust_revision_lines[0], "RUST_REVISION = '", "")
|
|
- _py_revision = string_replace(_py_revision, "'", "")
|
|
- _py_subrevision =
|
|
- string_replace(_rust_revision_lines[1], "RUST_SUB_REVISION = ", "")
|
|
- _expected_rust_revision = "$_py_revision-$_py_subrevision"
|
|
-
|
|
- # Ensure the rust version matches the clang version.
|
|
- assert(
|
|
- filter_include([ rustc_revision ],
|
|
- [ "*-$_expected_rust_revision-*" ]) != [],
|
|
- "rustc_revision=\"$rustc_revision\" but update_rust.py expected \"$_expected_rust_revision\". Run \"gclient sync\"?")
|
|
- }
|
|
-
|
|
- # This is here so that all files get recompiled after a clang roll and
|
|
- # when turning clang on or off. (defines are passed via the command line,
|
|
- # and build system rebuild things when their commandline changes). Nothing
|
|
- # should ever read this define.
|
|
- defines = [ "CR_CLANG_REVISION=\"$_clang_revision\"" ]
|
|
- }
|
|
-}
|
|
-
|
|
# Controls the usage of a warning suppression mapping (WSM) file to suppress
|
|
# warnings based on the path of the file they come from. It's controlled by the
|
|
# `clang_warning_suppression_file` gn argument , which points to a text file
|
|
@@ -2287,10 +2109,6 @@ config("chromium_code") {
|
|
}
|
|
} else {
|
|
cflags = [ "-Wall" ]
|
|
- if (is_clang) {
|
|
- # Enable extra warnings for chromium_code when we control the compiler.
|
|
- cflags += [ "-Wextra" ]
|
|
- }
|
|
|
|
# In Chromium code, we define __STDC_foo_MACROS in order to get the
|
|
# C99 macros on Mac and Linux.
|
|
@@ -2299,24 +2117,6 @@ config("chromium_code") {
|
|
"__STDC_FORMAT_MACROS",
|
|
]
|
|
|
|
- if (!is_debug && !using_sanitizer && current_cpu != "s390x" &&
|
|
- current_cpu != "s390" && current_cpu != "ppc64" &&
|
|
- current_cpu != "mips" && current_cpu != "mips64" &&
|
|
- current_cpu != "riscv64" && current_cpu != "loong64") {
|
|
- # Non-chromium code is not guaranteed to compile cleanly with
|
|
- # _FORTIFY_SOURCE. Also, fortified build may fail when optimizations are
|
|
- # disabled, so only do that for Release build.
|
|
- fortify_level = "2"
|
|
-
|
|
- # ChromeOS's toolchain supports a high-quality _FORTIFY_SOURCE=3
|
|
- # implementation with a few custom glibc patches. Use that if it's
|
|
- # available.
|
|
- if (is_chromeos_device && !lacros_use_chromium_toolchain) {
|
|
- fortify_level = "3"
|
|
- }
|
|
- defines += [ "_FORTIFY_SOURCE=" + fortify_level ]
|
|
- }
|
|
-
|
|
if (is_apple) {
|
|
cflags_objc = [ "-Wimplicit-retain-self" ]
|
|
cflags_objcc = [ "-Wimplicit-retain-self" ]
|
|
@@ -2736,7 +2536,8 @@ config("default_stack_frames") {
|
|
# [0]: https://pinpoint-dot-chromeperf.appspot.com/job/147634a8be0000
|
|
# [1]: https://pinpoint-dot-chromeperf.appspot.com/job/132bc772be0000
|
|
# [2]: https://crrev.com/c/5447532
|
|
-config("optimize") {
|
|
+config("optimize") { }
|
|
+config("xoptimize") {
|
|
if (is_win) {
|
|
# clang-cl's /O2 corresponds to clang's -O3, and really want -O2 for
|
|
# consistency with the other platforms.
|
|
@@ -2785,7 +2586,8 @@ config("optimize") {
|
|
}
|
|
|
|
# Turn off optimizations.
|
|
-config("no_optimize") {
|
|
+config("no_optimize") { }
|
|
+config("xno_optimize") {
|
|
if (is_win) {
|
|
cflags = [
|
|
"/Od", # Disable optimization.
|
|
@@ -2820,7 +2622,8 @@ config("no_optimize") {
|
|
# Turns up the optimization level. Used to explicitly enable -O2 instead of
|
|
# -Os for select targets on platforms that use optimize_for_size. No-op
|
|
# elsewhere.
|
|
-config("optimize_max") {
|
|
+config("optimize_max") { }
|
|
+config("xoptimize_max") {
|
|
ldflags = common_optimize_on_ldflags
|
|
if (is_win) {
|
|
# Favor speed over size, /O2 must be before the common flags.
|
|
@@ -2841,7 +2644,8 @@ config("optimize_max") {
|
|
#
|
|
# TODO(crbug.com/41259697) - rework how all of these configs are related
|
|
# so that we don't need this disclaimer.
|
|
-config("optimize_speed") {
|
|
+config("optimize_speed") { }
|
|
+config("xoptimize_speed") {
|
|
ldflags = common_optimize_on_ldflags
|
|
if (is_win) {
|
|
# Favor speed over size, /O2 must be before the common flags.
|
|
@@ -2858,7 +2662,8 @@ config("optimize_speed") {
|
|
rustflags = [ "-Copt-level=3" ]
|
|
}
|
|
|
|
-config("optimize_fuzzing") {
|
|
+config("optimize_fuzzing") { }
|
|
+config("xoptimize_fuzzing") {
|
|
cflags = [ "-O1" ] + common_optimize_on_cflags
|
|
rustflags = [ "-Copt-level=1" ]
|
|
ldflags = common_optimize_on_ldflags
|
|
@@ -2985,7 +2790,8 @@ config("win_pdbaltpath") {
|
|
}
|
|
|
|
# Full symbols.
|
|
-config("symbols") {
|
|
+config("symbols") { }
|
|
+config("xsymbols") {
|
|
rustflags = []
|
|
configs = []
|
|
if (is_win) {
|
|
@@ -3141,7 +2947,8 @@ config("symbols") {
|
|
# Minimal symbols.
|
|
# This config guarantees to hold symbol for stack trace which are shown to user
|
|
# when crash happens in unittests running on buildbot.
|
|
-config("minimal_symbols") {
|
|
+config("minimal_symbols") { }
|
|
+config("xminimal_symbols") {
|
|
rustflags = []
|
|
if (is_win) {
|
|
# Functions, files, and line tables only.
|
|
@@ -3217,7 +3024,8 @@ config("minimal_symbols") {
|
|
# This configuration contains function names only. That is, the compiler is
|
|
# told to not generate debug information and the linker then just puts function
|
|
# names in the final debug information.
|
|
-config("no_symbols") {
|
|
+config("no_symbols") { }
|
|
+config("xno_symbols") {
|
|
if (is_win) {
|
|
ldflags = [ "/DEBUG" ]
|
|
|