Path: blob/main/contrib/llvm-project/compiler-rt/lib/asan_abi/asan_abi.cpp
35235 views
//===-asan_abi.cpp - ASan Stable ABI---------------------------------------===//1//2// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.3// See https://llvm.org/LICENSE.txt for license information.4// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception5//6//===----------------------------------------------------------------------===//78#include "asan_abi.h"910extern "C" {11// Functions concerning instrumented global variables:12void __asan_abi_register_image_globals(void) {}13void __asan_abi_unregister_image_globals(void) {}14void __asan_abi_register_elf_globals(bool *flag, void *start, void *stop) {}15void __asan_abi_unregister_elf_globals(bool *flag, void *start, void *stop) {}16void __asan_abi_register_globals(void *globals, size_t n) {}17void __asan_abi_unregister_globals(void *globals, size_t n) {}1819// Functions concerning dynamic library initialization20void __asan_abi_before_dynamic_init(const char *module_name) {}21void __asan_abi_after_dynamic_init(void) {}2223// Functions concerning block memory destinations24void *__asan_abi_memcpy(void *d, const void *s, size_t n) { return NULL; }25void *__asan_abi_memmove(void *d, const void *s, size_t n) { return NULL; }26void *__asan_abi_memset(void *p, int c, size_t n) { return NULL; }2728// Functions concerning RTL startup and initialization29void __asan_abi_init(void) {}30void __asan_abi_handle_no_return(void) {}3132// Functions concerning memory load and store reporting33void __asan_abi_report_load_n(void *p, size_t n, bool abort) {}34void __asan_abi_report_exp_load_n(void *p, size_t n, int exp, bool abort) {}35void __asan_abi_report_store_n(void *p, size_t n, bool abort) {}36void __asan_abi_report_exp_store_n(void *p, size_t n, int exp, bool abort) {}3738// Functions concerning memory load and store39void __asan_abi_load_n(void *p, size_t n, bool abort) {}40void __asan_abi_exp_load_n(void *p, size_t n, int exp, bool abort) {}41void __asan_abi_store_n(void *p, size_t n, bool abort) {}42void __asan_abi_exp_store_n(void *p, size_t n, int exp, bool abort) {}4344// Functions concerning query about whether memory is poisoned45int __asan_abi_address_is_poisoned(void const volatile *p) { return 0; }46void *__asan_abi_region_is_poisoned(void const volatile *p, size_t size) {47return NULL;48}4950// Functions concerning the poisoning of memory51void __asan_abi_poison_memory_region(void const volatile *p, size_t n) {}52void __asan_abi_unpoison_memory_region(void const volatile *p, size_t n) {}5354// Functions concerning the partial poisoning of memory55void __asan_abi_set_shadow_xx_n(void *p, unsigned char xx, size_t n) {}5657// Functions concerning stack poisoning58void __asan_abi_poison_stack_memory(void *p, size_t n) {}59void __asan_abi_unpoison_stack_memory(void *p, size_t n) {}6061// Functions concerning redzone poisoning62void __asan_abi_poison_intra_object_redzone(void *p, size_t size) {}63void __asan_abi_unpoison_intra_object_redzone(void *p, size_t size) {}6465// Functions concerning array cookie poisoning66void __asan_abi_poison_cxx_array_cookie(void *p) {}67void *__asan_abi_load_cxx_array_cookie(void **p) { return NULL; }6869// Functions concerning fake stacks70void *__asan_abi_get_current_fake_stack(void) { return NULL; }71void *__asan_abi_addr_is_in_fake_stack(void *fake_stack, void *addr, void **beg,72void **end) {73return NULL;74}7576// Functions concerning poisoning and unpoisoning fake stack alloca77void __asan_abi_alloca_poison(void *addr, size_t size) {}78void __asan_abi_allocas_unpoison(void *top, void *bottom) {}7980// Functions concerning fake stack malloc81void *__asan_abi_stack_malloc_n(size_t scale, size_t size) { return NULL; }82void *__asan_abi_stack_malloc_always_n(size_t scale, size_t size) {83return NULL;84}8586// Functions concerning fake stack free87void __asan_abi_stack_free_n(int scale, void *p, size_t n) {}88}899091