1 //===-asan_abi.cpp - ASan Stable ABI---------------------------------------===//
2 //
3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4 // See https://llvm.org/LICENSE.txt for license information.
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6 //
7 //===----------------------------------------------------------------------===//
8 
9 #include "asan_abi.h"
10 
11 extern "C" {
12 // Functions concerning instrumented global variables:
13 void __asan_abi_register_image_globals(void) {}
14 void __asan_abi_unregister_image_globals(void) {}
15 
16 // Functions concerning dynamic library initialization
17 void __asan_abi_before_dynamic_init(const char *module_name) {}
18 void __asan_abi_after_dynamic_init(void) {}
19 
20 // Functions concerning block memory destinations
21 void *__asan_abi_memcpy(void *d, const void *s, size_t n) { return NULL; }
22 void *__asan_abi_memmove(void *d, const void *s, size_t n) { return NULL; }
23 void *__asan_abi_memset(void *p, int c, size_t n) { return NULL; }
24 
25 // Functions concerning RTL startup and initialization
26 void __asan_abi_init(void) {}
27 void __asan_abi_handle_no_return(void) {}
28 
29 // Functions concerning memory load and store reporting
30 void __asan_abi_report_load_n(void *p, size_t n, bool abort) {}
31 void __asan_abi_report_exp_load_n(void *p, size_t n, int exp, bool abort) {}
32 void __asan_abi_report_store_n(void *p, size_t n, bool abort) {}
33 void __asan_abi_report_exp_store_n(void *p, size_t n, int exp, bool abort) {}
34 
35 // Functions concerning memory load and store
36 void __asan_abi_load_n(void *p, size_t n, bool abort) {}
37 void __asan_abi_exp_load_n(void *p, size_t n, int exp, bool abort) {}
38 void __asan_abi_store_n(void *p, size_t n, bool abort) {}
39 void __asan_abi_exp_store_n(void *p, size_t n, int exp, bool abort) {}
40 
41 // Functions concerning query about whether memory is poisoned
42 int __asan_abi_address_is_poisoned(void const volatile *p) { return 0; }
43 void *__asan_abi_region_is_poisoned(void const volatile *p, size_t size) {
44   return NULL;
45 }
46 
47 // Functions concerning the poisoning of memory
48 void __asan_abi_poison_memory_region(void const volatile *p, size_t n) {}
49 void __asan_abi_unpoison_memory_region(void const volatile *p, size_t n) {}
50 
51 // Functions concerning the partial poisoning of memory
52 void __asan_abi_set_shadow_xx_n(void *p, unsigned char xx, size_t n) {}
53 
54 // Functions concerning stack poisoning
55 void __asan_abi_poison_stack_memory(void *p, size_t n) {}
56 void __asan_abi_unpoison_stack_memory(void *p, size_t n) {}
57 
58 // Functions concerning redzone poisoning
59 void __asan_abi_poison_intra_object_redzone(void *p, size_t size) {}
60 void __asan_abi_unpoison_intra_object_redzone(void *p, size_t size) {}
61 
62 // Functions concerning array cookie poisoning
63 void __asan_abi_poison_cxx_array_cookie(void *p) {}
64 void *__asan_abi_load_cxx_array_cookie(void **p) { return NULL; }
65 
66 // Functions concerning fake stacks
67 void *__asan_abi_get_current_fake_stack(void) { return NULL; }
68 void *__asan_abi_addr_is_in_fake_stack(void *fake_stack, void *addr, void **beg,
69                                        void **end) {
70   return NULL;
71 }
72 
73 // Functions concerning poisoning and unpoisoning fake stack alloca
74 void __asan_abi_alloca_poison(void *addr, size_t size) {}
75 void __asan_abi_allocas_unpoison(void *top, void *bottom) {}
76 
77 // Functions concerning fake stack malloc
78 void *__asan_abi_stack_malloc_n(size_t scale, size_t size) { return NULL; }
79 void *__asan_abi_stack_malloc_always_n(size_t scale, size_t size) {
80   return NULL;
81 }
82 
83 // Functions concerning fake stack free
84 void __asan_abi_stack_free_n(int scale, void *p, size_t n) {}
85 }
86