File: asan_abi.cpp

package info (click to toggle)
swiftlang 6.1.3-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 2,791,532 kB
  • sloc: cpp: 9,901,743; ansic: 2,201,431; asm: 1,091,827; python: 308,252; objc: 82,166; f90: 80,126; lisp: 38,358; pascal: 25,559; sh: 20,429; ml: 5,058; perl: 4,745; makefile: 4,484; awk: 3,535; javascript: 3,018; xml: 918; fortran: 664; cs: 573; ruby: 396
file content (89 lines) | stat: -rw-r--r-- 3,857 bytes parent folder | download | duplicates (17)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
//===-asan_abi.cpp - ASan Stable ABI---------------------------------------===//
//
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
// See https://llvm.org/LICENSE.txt for license information.
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
//
//===----------------------------------------------------------------------===//

#include "asan_abi.h"

extern "C" {
// Functions concerning instrumented global variables:
void __asan_abi_register_image_globals(void) {}
void __asan_abi_unregister_image_globals(void) {}
void __asan_abi_register_elf_globals(bool *flag, void *start, void *stop) {}
void __asan_abi_unregister_elf_globals(bool *flag, void *start, void *stop) {}
void __asan_abi_register_globals(void *globals, size_t n) {}
void __asan_abi_unregister_globals(void *globals, size_t n) {}

// Functions concerning dynamic library initialization
void __asan_abi_before_dynamic_init(const char *module_name) {}
void __asan_abi_after_dynamic_init(void) {}

// Functions concerning block memory destinations
void *__asan_abi_memcpy(void *d, const void *s, size_t n) { return NULL; }
void *__asan_abi_memmove(void *d, const void *s, size_t n) { return NULL; }
void *__asan_abi_memset(void *p, int c, size_t n) { return NULL; }

// Functions concerning RTL startup and initialization
void __asan_abi_init(void) {}
void __asan_abi_handle_no_return(void) {}

// Functions concerning memory load and store reporting
void __asan_abi_report_load_n(void *p, size_t n, bool abort) {}
void __asan_abi_report_exp_load_n(void *p, size_t n, int exp, bool abort) {}
void __asan_abi_report_store_n(void *p, size_t n, bool abort) {}
void __asan_abi_report_exp_store_n(void *p, size_t n, int exp, bool abort) {}

// Functions concerning memory load and store
void __asan_abi_load_n(void *p, size_t n, bool abort) {}
void __asan_abi_exp_load_n(void *p, size_t n, int exp, bool abort) {}
void __asan_abi_store_n(void *p, size_t n, bool abort) {}
void __asan_abi_exp_store_n(void *p, size_t n, int exp, bool abort) {}

// Functions concerning query about whether memory is poisoned
int __asan_abi_address_is_poisoned(void const volatile *p) { return 0; }
void *__asan_abi_region_is_poisoned(void const volatile *p, size_t size) {
  return NULL;
}

// Functions concerning the poisoning of memory
void __asan_abi_poison_memory_region(void const volatile *p, size_t n) {}
void __asan_abi_unpoison_memory_region(void const volatile *p, size_t n) {}

// Functions concerning the partial poisoning of memory
void __asan_abi_set_shadow_xx_n(void *p, unsigned char xx, size_t n) {}

// Functions concerning stack poisoning
void __asan_abi_poison_stack_memory(void *p, size_t n) {}
void __asan_abi_unpoison_stack_memory(void *p, size_t n) {}

// Functions concerning redzone poisoning
void __asan_abi_poison_intra_object_redzone(void *p, size_t size) {}
void __asan_abi_unpoison_intra_object_redzone(void *p, size_t size) {}

// Functions concerning array cookie poisoning
void __asan_abi_poison_cxx_array_cookie(void *p) {}
void *__asan_abi_load_cxx_array_cookie(void **p) { return NULL; }

// Functions concerning fake stacks
void *__asan_abi_get_current_fake_stack(void) { return NULL; }
void *__asan_abi_addr_is_in_fake_stack(void *fake_stack, void *addr, void **beg,
                                       void **end) {
  return NULL;
}

// Functions concerning poisoning and unpoisoning fake stack alloca
void __asan_abi_alloca_poison(void *addr, size_t size) {}
void __asan_abi_allocas_unpoison(void *top, void *bottom) {}

// Functions concerning fake stack malloc
void *__asan_abi_stack_malloc_n(size_t scale, size_t size) { return NULL; }
void *__asan_abi_stack_malloc_always_n(size_t scale, size_t size) {
  return NULL;
}

// Functions concerning fake stack free
void __asan_abi_stack_free_n(int scale, void *p, size_t n) {}
}