Bug 1595633 - Enable 'pointer-overflow' UBSan check. r=froydnj
authorTyson Smith <twsmith@mozilla.com>
Tue, 12 Nov 2019 16:29:37 +0000
changeset 501598 7edb2cd99ae5d26020e939561d161ab7ea1dab2b
parent 501597 e7b53d25d5d49ae470eaf3c8eeabeb2ca27808f7
child 501599 3b21c6bc1e1c58fefc34c71ad370fe903c42613f
push id114172
push userdluca@mozilla.com
push dateTue, 19 Nov 2019 11:31:10 +0000
treeherdermozilla-inbound@b5c5ba07d3db [default view] [failures only]
perfherder[talos] [build metrics] [platform microbench] (compared to previous push)
reviewersfroydnj
bugs1595633
milestone72.0a1
first release with
nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
last release without
nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
Bug 1595633 - Enable 'pointer-overflow' UBSan check. r=froydnj Differential Revision: https://phabricator.services.mozilla.com/D52608
build/moz.configure/toolchain.configure
--- a/build/moz.configure/toolchain.configure
+++ b/build/moz.configure/toolchain.configure
@@ -1477,16 +1477,17 @@ js_option('--enable-undefined-sanitizer'
           help='Enable UndefinedBehavior Sanitizer')
 
 @depends_if('--enable-undefined-sanitizer')
 def ubsan(options):
     default_checks = [
         'bool',
         'bounds',
         'integer-divide-by-zero',
+        'pointer-overflow',
         'vla-bound',
     ]
 
     checks = options if len(options) else default_checks
 
     return ','.join(checks)
 
 add_old_configure_assignment('MOZ_UBSAN_CHECKS', ubsan)