1 //===-asan_abi.cpp - ASan Stable ABI---------------------------------------===// 2 // 3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. 4 // See https://llvm.org/LICENSE.txt for license information. 5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 6 // 7 //===----------------------------------------------------------------------===// 8 9 #include "asan_abi.h" 10 11 extern "C" { 12 // Functions concerning instrumented global variables: 13 void __asan_abi_register_image_globals(void) {} 14 void __asan_abi_unregister_image_globals(void) {} 15 16 // Functions concerning dynamic library initialization 17 void __asan_abi_before_dynamic_init(const char *module_name) {} 18 void __asan_abi_after_dynamic_init(void) {} 19 20 // Functions concerning block memory destinations 21 void *__asan_abi_memcpy(void *d, const void *s, size_t n) { return NULL; } 22 void *__asan_abi_memmove(void *d, const void *s, size_t n) { return NULL; } 23 void *__asan_abi_memset(void *p, int c, size_t n) { return NULL; } 24 25 // Functions concerning RTL startup and initialization 26 void __asan_abi_init(void) {} 27 void __asan_abi_handle_no_return(void) {} 28 29 // Functions concerning memory load and store reporting 30 void __asan_abi_report_load_n(void *p, size_t n, bool abort) {} 31 void __asan_abi_report_exp_load_n(void *p, size_t n, int exp, bool abort) {} 32 void __asan_abi_report_store_n(void *p, size_t n, bool abort) {} 33 void __asan_abi_report_exp_store_n(void *p, size_t n, int exp, bool abort) {} 34 35 // Functions concerning memory load and store 36 void __asan_abi_load_n(void *p, size_t n, bool abort) {} 37 void __asan_abi_exp_load_n(void *p, size_t n, int exp, bool abort) {} 38 void __asan_abi_store_n(void *p, size_t n, bool abort) {} 39 void __asan_abi_exp_store_n(void *p, size_t n, int exp, bool abort) {} 40 41 // Functions concerning query about whether memory is poisoned 42 int __asan_abi_address_is_poisoned(void const volatile *p) { return 0; } 43 void *__asan_abi_region_is_poisoned(void const volatile *p, size_t size) { 44 return NULL; 45 } 46 47 // Functions concerning the poisoning of memory 48 void __asan_abi_poison_memory_region(void const volatile *p, size_t n) {} 49 void __asan_abi_unpoison_memory_region(void const volatile *p, size_t n) {} 50 51 // Functions concerning the partial poisoning of memory 52 void __asan_abi_set_shadow_xx_n(void *p, unsigned char xx, size_t n) {} 53 54 // Functions concerning stack poisoning 55 void __asan_abi_poison_stack_memory(void *p, size_t n) {} 56 void __asan_abi_unpoison_stack_memory(void *p, size_t n) {} 57 58 // Functions concerning redzone poisoning 59 void __asan_abi_poison_intra_object_redzone(void *p, size_t size) {} 60 void __asan_abi_unpoison_intra_object_redzone(void *p, size_t size) {} 61 62 // Functions concerning array cookie poisoning 63 void __asan_abi_poison_cxx_array_cookie(void *p) {} 64 void *__asan_abi_load_cxx_array_cookie(void **p) { return NULL; } 65 66 // Functions concerning fake stacks 67 void *__asan_abi_get_current_fake_stack(void) { return NULL; } 68 void *__asan_abi_addr_is_in_fake_stack(void *fake_stack, void *addr, void **beg, 69 void **end) { 70 return NULL; 71 } 72 73 // Functions concerning poisoning and unpoisoning fake stack alloca 74 void __asan_abi_alloca_poison(void *addr, size_t size) {} 75 void __asan_abi_allocas_unpoison(void *top, void *bottom) {} 76 77 // Functions concerning fake stack malloc 78 void *__asan_abi_stack_malloc_n(size_t scale, size_t size) { return NULL; } 79 void *__asan_abi_stack_malloc_always_n(size_t scale, size_t size) { 80 return NULL; 81 } 82 83 // Functions concerning fake stack free 84 void __asan_abi_stack_free_n(int scale, void *p, size_t n) {} 85 } 86