diff options
Diffstat (limited to 'contrib/llvm-project/compiler-rt/lib/asan_abi/asan_abi.cpp')
-rw-r--r-- | contrib/llvm-project/compiler-rt/lib/asan_abi/asan_abi.cpp | 89 |
1 files changed, 89 insertions, 0 deletions
diff --git a/contrib/llvm-project/compiler-rt/lib/asan_abi/asan_abi.cpp b/contrib/llvm-project/compiler-rt/lib/asan_abi/asan_abi.cpp new file mode 100644 index 000000000000..cf8663024eb7 --- /dev/null +++ b/contrib/llvm-project/compiler-rt/lib/asan_abi/asan_abi.cpp @@ -0,0 +1,89 @@ +//===-asan_abi.cpp - ASan Stable ABI---------------------------------------===// +// +// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. +// See https://llvm.org/LICENSE.txt for license information. +// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception +// +//===----------------------------------------------------------------------===// + +#include "asan_abi.h" + +extern "C" { +// Functions concerning instrumented global variables: +void __asan_abi_register_image_globals(void) {} +void __asan_abi_unregister_image_globals(void) {} +void __asan_abi_register_elf_globals(bool *flag, void *start, void *stop) {} +void __asan_abi_unregister_elf_globals(bool *flag, void *start, void *stop) {} +void __asan_abi_register_globals(void *globals, size_t n) {} +void __asan_abi_unregister_globals(void *globals, size_t n) {} + +// Functions concerning dynamic library initialization +void __asan_abi_before_dynamic_init(const char *module_name) {} +void __asan_abi_after_dynamic_init(void) {} + +// Functions concerning block memory destinations +void *__asan_abi_memcpy(void *d, const void *s, size_t n) { return NULL; } +void *__asan_abi_memmove(void *d, const void *s, size_t n) { return NULL; } +void *__asan_abi_memset(void *p, int c, size_t n) { return NULL; } + +// Functions concerning RTL startup and initialization +void __asan_abi_init(void) {} +void __asan_abi_handle_no_return(void) {} + +// Functions concerning memory load and store reporting +void __asan_abi_report_load_n(void *p, size_t n, bool abort) {} +void __asan_abi_report_exp_load_n(void *p, size_t n, int exp, bool abort) {} +void __asan_abi_report_store_n(void *p, size_t n, bool abort) {} +void __asan_abi_report_exp_store_n(void *p, size_t n, int exp, bool abort) {} + +// Functions concerning memory load and store +void __asan_abi_load_n(void *p, size_t n, bool abort) {} +void __asan_abi_exp_load_n(void *p, size_t n, int exp, bool abort) {} +void __asan_abi_store_n(void *p, size_t n, bool abort) {} +void __asan_abi_exp_store_n(void *p, size_t n, int exp, bool abort) {} + +// Functions concerning query about whether memory is poisoned +int __asan_abi_address_is_poisoned(void const volatile *p) { return 0; } +void *__asan_abi_region_is_poisoned(void const volatile *p, size_t size) { + return NULL; +} + +// Functions concerning the poisoning of memory +void __asan_abi_poison_memory_region(void const volatile *p, size_t n) {} +void __asan_abi_unpoison_memory_region(void const volatile *p, size_t n) {} + +// Functions concerning the partial poisoning of memory +void __asan_abi_set_shadow_xx_n(void *p, unsigned char xx, size_t n) {} + +// Functions concerning stack poisoning +void __asan_abi_poison_stack_memory(void *p, size_t n) {} +void __asan_abi_unpoison_stack_memory(void *p, size_t n) {} + +// Functions concerning redzone poisoning +void __asan_abi_poison_intra_object_redzone(void *p, size_t size) {} +void __asan_abi_unpoison_intra_object_redzone(void *p, size_t size) {} + +// Functions concerning array cookie poisoning +void __asan_abi_poison_cxx_array_cookie(void *p) {} +void *__asan_abi_load_cxx_array_cookie(void **p) { return NULL; } + +// Functions concerning fake stacks +void *__asan_abi_get_current_fake_stack(void) { return NULL; } +void *__asan_abi_addr_is_in_fake_stack(void *fake_stack, void *addr, void **beg, + void **end) { + return NULL; +} + +// Functions concerning poisoning and unpoisoning fake stack alloca +void __asan_abi_alloca_poison(void *addr, size_t size) {} +void __asan_abi_allocas_unpoison(void *top, void *bottom) {} + +// Functions concerning fake stack malloc +void *__asan_abi_stack_malloc_n(size_t scale, size_t size) { return NULL; } +void *__asan_abi_stack_malloc_always_n(size_t scale, size_t size) { + return NULL; +} + +// Functions concerning fake stack free +void __asan_abi_stack_free_n(int scale, void *p, size_t n) {} +} |