From d10bc3a2b8300cffc383e10c3730871e851be24c Mon Sep 17 00:00:00 2001 From: KJ Tsanaktsidis Date: Sun, 12 Nov 2023 16:19:31 +1100 Subject: Mark asan fake stacks during machine stack marking ASAN leaves a pointer to the fake frame on the stack; we can use the __asan_addr_is_in_fake_stack API to work out the extent of the fake stack and thus mark any VALUEs contained therein. [Bug #20001] --- ext/ripper/depend | 1 + 1 file changed, 1 insertion(+) (limited to 'ext/ripper') diff --git a/ext/ripper/depend b/ext/ripper/depend index a07825fd40..3b9b890de8 100644 --- a/ext/ripper/depend +++ b/ext/ripper/depend @@ -593,6 +593,7 @@ ripper.o: $(top_srcdir)/internal/parse.h ripper.o: $(top_srcdir)/internal/rational.h ripper.o: $(top_srcdir)/internal/re.h ripper.o: $(top_srcdir)/internal/ruby_parser.h +ripper.o: $(top_srcdir)/internal/sanitizers.h ripper.o: $(top_srcdir)/internal/serial.h ripper.o: $(top_srcdir)/internal/static_assert.h ripper.o: $(top_srcdir)/internal/string.h -- cgit v1.2.3