)]}' { "commit": "abf4bc916ab136eb1d5658632c63f950890f3eed", "tree": "131b3f0f50ccf6b5e41ad53375809cbd697f0681", "parents": [ "20f4a364a83d9a3906d3cf8b866d00437f8ff2d4" ], "author": { "name": "Dan Albert", "email": "danalbert@google.com", "time": "Tue Jun 16 23:27:34 2015 -0700" }, "committer": { "name": "Dan Albert", "email": "danalbert@google.com", "time": "Fri Jun 19 10:28:06 2015 -0700" }, "message": "Add support for `LOCAL_SANITIZE :\u003d integer`.\n\nThis also does a bit of cleanup in config_sanitizers.mk. The result is\nthat `LOCAL_SANITIZE :\u003d \u003cany arbitrary ubsan group\u003e` should function\nfine for both host and target.\n\nThis is a superset of LOCAL_DETECT_INTEGER_OVERFLOWS, so remove that.\nThis also checks integer division by zero. It\u0027s supposed to cover\nshifting undefined behaviors as well, but apparently it does not\n(though `LOCAL_SANITIZE :\u003d shift` works fine).\n\nChange-Id: I4ac99eafa6920a3f8cb82af37ce56ff0fdb95223\n", "tree_diff": [ { "type": "modify", "old_id": "512b11665fc0d1cd070512f52bb8c42d37184d61", "old_mode": 33188, "old_path": "core/clang/config.mk", "new_id": "4875ea12f7cd71e0c210272dd10e29256a79f7a4", "new_mode": 33188, "new_path": "core/clang/config.mk" }, { "type": "modify", "old_id": "e352cc5a806202b5c799c5bfd7b537b3fb177b5c", "old_mode": 33188, "old_path": "core/clear_vars.mk", "new_id": "f30c8ba668cfa168bf93c4b72894b97d2a68f2a3", "new_mode": 33188, "new_path": "core/clear_vars.mk" }, { "type": "modify", "old_id": "9cff6ea33d66456a7b23f25139121d5ae9efb4a1", "old_mode": 33188, "old_path": "core/config_sanitizers.mk", "new_id": "7ebbf9ff491e8c6ff888c83b0424e76ce72754f9", "new_mode": 33188, "new_path": "core/config_sanitizers.mk" } ] }