mirror of
https://github.com/asmjit/asmjit.git
synced 2025-12-16 20:17:05 +03:00
* Denested src folder to root, renamed testing to asmjit-testing
* Refactored how headers are included into <asmjit/...> form. This
is necessary as compilers would never simplify a path once a ..
appears in include directory - then paths such as ../core/../core
appeared in asserts, which was ugly
* Moved support utilities into asmjit/support/... (still included
by asmjit/core.h for convenience and compatibility)
* Added CMakePresets.json for making it easy to develop AsmJit
* Reworked CMakeLists to be shorter and use CMake option(),
etc... This simplifies it and makes it using more standard
features
* ASMJIT_EMBED now creates asmjit_embed INTERFACE library,
which is accessible via asmjit::asmjit target - this simplifies
embedding and makes it the same as library targets from a CMake
perspective
* Removed ASMJIT_DEPS - this is now provided by cmake target
aliases - 'asmjit::asmjit' so users should not need this variable
* Changed meaning of ASMJIT_LIBS - this now contains only AsmJit
dependencies without asmjit::asmjit target alias. Don't rely on
ASMJIT_LIBS anymore as it's only used internally
* Removed ASMJIT_NO_DEPRECATED option - AsmJit is not going
to provide controllable deprecations in the future
* Removed ASMJIT_NO_VALIDATION in favor of ASMJIT_NO_INTROSPECTION,
which now controls query, features, and validation API presence
* Removed ASMJIT_DIR option - it was never really needed
* Removed AMX_TRANSPOSE feature from instruction database (X86).
Intel has removed it as well, so it's a feature that won't
be siliconized
303 lines
9.7 KiB
C++
303 lines
9.7 KiB
C++
// This file is part of AsmJit project <https://asmjit.com>
|
|
//
|
|
// See <asmjit/core.h> or LICENSE.md for license and copyright information
|
|
// SPDX-License-Identifier: Zlib
|
|
|
|
#include <asmjit/core.h>
|
|
|
|
#if !defined(ASMJIT_NO_X86) && ASMJIT_ARCH_X86 != 0
|
|
#include <asmjit/x86.h>
|
|
#endif
|
|
|
|
#if !defined(ASMJIT_NO_AARCH64) && ASMJIT_ARCH_ARM == 64
|
|
#include <asmjit/a64.h>
|
|
#endif
|
|
|
|
#include <asmjit-testing/commons/asmjitutils.h>
|
|
|
|
using namespace asmjit;
|
|
|
|
static void print_app_info() {
|
|
printf("AsmJit Environment Test v%u.%u.%u [Arch=%s] [Mode=%s]\n\n",
|
|
unsigned((ASMJIT_LIBRARY_VERSION >> 16) ),
|
|
unsigned((ASMJIT_LIBRARY_VERSION >> 8) & 0xFF),
|
|
unsigned((ASMJIT_LIBRARY_VERSION ) & 0xFF),
|
|
asmjit_arch_as_string(Arch::kHost),
|
|
asmjit_build_type()
|
|
);
|
|
|
|
printf("This application can be used to verify AsmJit build options and to verify the\n");
|
|
printf("environment where it runs. For example to check CPU extensions available, system\n");
|
|
printf("hardening (RWX restrictions), large page support, and virtual memory allocations.\n");
|
|
printf("\n");
|
|
}
|
|
|
|
const char* stringify_bool(bool b) noexcept { return b ? "true" : "false"; };
|
|
const char* stringify_result(Error err) noexcept { return err == Error::kOk ? "success" : DebugUtils::error_as_string(err); };
|
|
|
|
using VoidFunc = void (ASMJIT_CDECL*)(void);
|
|
|
|
#if !defined(ASMJIT_NO_JIT)
|
|
|
|
#if !defined(ASMJIT_NO_X86) && ASMJIT_ARCH_X86 != 0
|
|
#define TEST_ENVIRONMENT_HAS_JIT
|
|
|
|
static void emit_void_function(CodeHolder& code) noexcept {
|
|
x86::Assembler a(&code);
|
|
a.ret();
|
|
}
|
|
#endif
|
|
|
|
#if !defined(ASMJIT_NO_AARCH64) && ASMJIT_ARCH_ARM == 64
|
|
#define TEST_ENVIRONMENT_HAS_JIT
|
|
|
|
static void emit_void_function(CodeHolder& code) noexcept {
|
|
a64::Assembler a(&code);
|
|
a.ret(a64::x30);
|
|
}
|
|
#endif
|
|
|
|
#if defined(TEST_ENVIRONMENT_HAS_JIT)
|
|
static void* offset_pointer(void* ptr, size_t offset) noexcept {
|
|
return static_cast<void*>(static_cast<uint8_t*>(ptr) + offset);
|
|
}
|
|
|
|
static size_t write_empty_function_at(void* ptr, size_t size) noexcept {
|
|
printf(" Write JIT code at addr : %p\n", ptr);
|
|
|
|
CodeHolder code;
|
|
Error err = code.init(Environment::host());
|
|
if (err != Error::kOk) {
|
|
printf( "Failed to initialize CodeHolder (%s)\n", DebugUtils::error_as_string(err));
|
|
return 0;
|
|
}
|
|
|
|
emit_void_function(code);
|
|
code.flatten();
|
|
code.copy_flattened_data(ptr, size);
|
|
|
|
return code.code_size();
|
|
}
|
|
|
|
static void flush_instruction_cache(void* ptr, size_t size) noexcept {
|
|
printf(" Flush JIT code at addr : %p [size=%zu]\n", ptr, size);
|
|
VirtMem::flush_instruction_cache(ptr, size);
|
|
}
|
|
|
|
static void invoke_void_function(void* ptr) noexcept {
|
|
printf(" Invoke JIT code at addr : %p\n", ptr);
|
|
|
|
// In case it crashes, we want to have the output flushed.
|
|
fflush(stdout);
|
|
|
|
VoidFunc func = reinterpret_cast<VoidFunc>(ptr);
|
|
func();
|
|
}
|
|
#endif
|
|
|
|
static void print_virt_mem_info_and_test_execution() noexcept {
|
|
using MemoryFlags = VirtMem::MemoryFlags;
|
|
using HardenedRuntimeInfo = VirtMem::HardenedRuntimeInfo;
|
|
using HardenedRuntimeFlags = VirtMem::HardenedRuntimeFlags;
|
|
|
|
// Size of a virtual memory allocation.
|
|
constexpr size_t kVMemAllocSize = 65536;
|
|
|
|
// Offset to the first function to execute (must be greater than 8 for UBSAN to work).
|
|
[[maybe_unused]]
|
|
constexpr size_t kVirtFuncOffset = 64;
|
|
|
|
size_t large_page_size = VirtMem::large_page_size();
|
|
HardenedRuntimeInfo rti = VirtMem::hardened_runtime_info();
|
|
|
|
printf("Large/Huge Pages Info:\n");
|
|
printf(" Large pages supported : %s\n", stringify_bool(large_page_size != 0u));
|
|
if (large_page_size >= 1024 * 1024) {
|
|
printf(" Large page size : %zu MiB\n", large_page_size / (1024u * 1024u));
|
|
}
|
|
else if (large_page_size) {
|
|
printf(" Large page size : %zu KiB\n", large_page_size / 1024u);
|
|
}
|
|
printf("\n");
|
|
|
|
printf("Hardened Environment Info:\n");
|
|
printf(" Hardening was detected : %s\n", stringify_bool(rti.has_flag(HardenedRuntimeFlags::kEnabled )));
|
|
printf(" MAP_JIT is available : %s\n", stringify_bool(rti.has_flag(HardenedRuntimeFlags::kMapJit )));
|
|
printf(" DualMapping is available: %s\n", stringify_bool(rti.has_flag(HardenedRuntimeFlags::kDualMapping)));
|
|
printf("\n");
|
|
|
|
if (!rti.has_flag(HardenedRuntimeFlags::kEnabled)) {
|
|
printf("Virtual Memory Allocation (RWX):\n");
|
|
|
|
void* ptr = nullptr;
|
|
Error result = VirtMem::alloc(&ptr, kVMemAllocSize, MemoryFlags::kAccessRWX);
|
|
printf(" Alloc virt memory (RWX) : %s\n", stringify_result(result));
|
|
|
|
if (result == Error::kOk) {
|
|
#if defined(TEST_ENVIRONMENT_HAS_JIT)
|
|
void* func_ptr = offset_pointer(ptr, kVirtFuncOffset);
|
|
size_t func_size = write_empty_function_at(func_ptr, kVMemAllocSize);
|
|
|
|
if (func_size) {
|
|
flush_instruction_cache(func_ptr, func_size);
|
|
invoke_void_function(func_ptr);
|
|
}
|
|
#endif // TEST_ENVIRONMENT_HAS_JIT
|
|
|
|
result = VirtMem::release(ptr, kVMemAllocSize);
|
|
printf(" Release virt memory : %s\n", stringify_result(result));
|
|
}
|
|
|
|
printf("\n");
|
|
}
|
|
|
|
{
|
|
printf("Virtual Memory Allocation (RW - Flipping Permissions RW<->RX):\n");
|
|
|
|
void* ptr = nullptr;
|
|
Error result = VirtMem::alloc(&ptr, kVMemAllocSize, MemoryFlags::kAccessRW | MemoryFlags::kMMapMaxAccessRWX);
|
|
printf(" Alloc virt memory (RW) : %s (allocation uses kMMapMaxAccessRWX)\n", stringify_result(result));
|
|
|
|
if (result == Error::kOk) {
|
|
#if defined(TEST_ENVIRONMENT_HAS_JIT)
|
|
void* func_ptr = offset_pointer(ptr, kVirtFuncOffset);
|
|
size_t func_size = write_empty_function_at(func_ptr, kVMemAllocSize);
|
|
#endif // TEST_ENVIRONMENT_HAS_JIT
|
|
|
|
result = VirtMem::protect(ptr, kVMemAllocSize, MemoryFlags::kAccessRX);
|
|
printf(" Protect virt memory (RX): %s\n", stringify_result(result));
|
|
|
|
#if defined(TEST_ENVIRONMENT_HAS_JIT)
|
|
if (func_size) {
|
|
flush_instruction_cache(func_ptr, func_size);
|
|
invoke_void_function(func_ptr);
|
|
}
|
|
#endif // TEST_ENVIRONMENT_HAS_JIT
|
|
|
|
result = VirtMem::protect(ptr, kVMemAllocSize, MemoryFlags::kAccessRW);
|
|
printf(" Protect virt memory (RW): %s\n", stringify_result(result));
|
|
|
|
result = VirtMem::release(ptr, kVMemAllocSize);
|
|
printf(" Release virt memory (RW): %s\n", stringify_result(result));
|
|
}
|
|
|
|
printf("\n");
|
|
}
|
|
|
|
if (rti.has_flag(HardenedRuntimeFlags::kMapJit)) {
|
|
printf("Virtual Memory Allocation (MAP_JIT):\n");
|
|
|
|
void* ptr = nullptr;
|
|
Error result = VirtMem::alloc(&ptr, kVMemAllocSize, MemoryFlags::kAccessRWX | MemoryFlags::kMMapEnableMapJit);
|
|
printf(" Alloc virt mem (RWX) : %s (allocation uses kMMapEnableMapJit)\n", stringify_result(result));
|
|
|
|
if (result == Error::kOk) {
|
|
printf(" Protect JIT Memory (RW) : (per-thread protection)\n");
|
|
VirtMem::protect_jit_memory(VirtMem::ProtectJitAccess::kReadWrite);
|
|
|
|
#if defined(TEST_ENVIRONMENT_HAS_JIT)
|
|
void* func_ptr = offset_pointer(ptr, kVirtFuncOffset);
|
|
size_t func_size = write_empty_function_at(func_ptr, kVMemAllocSize);
|
|
#endif // TEST_ENVIRONMENT_HAS_JIT
|
|
|
|
printf(" Protect JIT Memory (RX) : (per-thread protection)\n");
|
|
VirtMem::protect_jit_memory(VirtMem::ProtectJitAccess::kReadExecute);
|
|
|
|
#if defined(TEST_ENVIRONMENT_HAS_JIT)
|
|
if (func_size) {
|
|
flush_instruction_cache(func_ptr, func_size);
|
|
invoke_void_function(func_ptr);
|
|
}
|
|
#endif // TEST_ENVIRONMENT_HAS_JIT
|
|
|
|
result = VirtMem::release(ptr, kVMemAllocSize);
|
|
printf(" Release virt memory : %s\n", stringify_result(result));
|
|
}
|
|
|
|
printf("\n");
|
|
}
|
|
|
|
if (rti.has_flag(HardenedRuntimeFlags::kDualMapping)) {
|
|
printf("Virtual Memory Allocation (Dual Mapping):\n");
|
|
|
|
VirtMem::DualMapping dm {};
|
|
Error result = VirtMem::alloc_dual_mapping(Out(dm), kVMemAllocSize, MemoryFlags::kAccessRWX);
|
|
printf(" Alloc dual mem (RW+RX) : %s\n", stringify_result(result));
|
|
|
|
if (result == Error::kOk) {
|
|
#if defined(TEST_ENVIRONMENT_HAS_JIT)
|
|
size_t func_size = write_empty_function_at(offset_pointer(dm.rw, kVirtFuncOffset), kVMemAllocSize);
|
|
if (func_size) {
|
|
flush_instruction_cache(offset_pointer(dm.rx, kVirtFuncOffset), func_size);
|
|
invoke_void_function(offset_pointer(dm.rx, kVirtFuncOffset));
|
|
}
|
|
#endif // TEST_ENVIRONMENT_HAS_JIT
|
|
|
|
result = VirtMem::release_dual_mapping(dm, kVMemAllocSize);
|
|
printf(" Release dual mem (RW+RX): %s\n", stringify_result(result));
|
|
}
|
|
|
|
printf("\n");
|
|
}
|
|
}
|
|
|
|
#if defined(TEST_ENVIRONMENT_HAS_JIT)
|
|
static void print_jit_runtime_info_and_test_execution_with_params(const JitAllocator::CreateParams* params, const char* params_name) noexcept {
|
|
printf("JitRuntime (%s):\n", params_name);
|
|
|
|
JitRuntime rt(params);
|
|
CodeHolder code;
|
|
|
|
Error result = code.init(rt.environment());
|
|
printf(" CodeHolder init result : %s\n", stringify_result(result));
|
|
|
|
if (result != Error::kOk) {
|
|
return;
|
|
}
|
|
|
|
emit_void_function(code);
|
|
VoidFunc fn;
|
|
|
|
result = rt.add(&fn, &code);
|
|
printf(" Runtime.add() result : %s\n", stringify_result(result));
|
|
|
|
if (result == Error::kOk) {
|
|
invoke_void_function((void*)fn);
|
|
|
|
result = rt.release(fn);
|
|
printf(" Runtime.release() result: %s\n", stringify_result(result));
|
|
}
|
|
|
|
printf("\n");
|
|
}
|
|
|
|
static void print_jit_runtime_info_and_test_execution() noexcept {
|
|
print_jit_runtime_info_and_test_execution_with_params(nullptr, "<no params>");
|
|
|
|
if (VirtMem::large_page_size()) {
|
|
JitAllocator::CreateParams p{};
|
|
p.options = JitAllocatorOptions::kUseLargePages;
|
|
|
|
print_jit_runtime_info_and_test_execution_with_params(&p, "large pages");
|
|
}
|
|
}
|
|
#endif // TEST_ENVIRONMENT_HAS_JIT
|
|
|
|
#endif // !ASMJIT_NO_JIT
|
|
|
|
int main() {
|
|
print_app_info();
|
|
print_build_options();
|
|
print_cpu_info();
|
|
|
|
#if !defined(ASMJIT_NO_JIT)
|
|
print_virt_mem_info_and_test_execution();
|
|
#endif // !ASMJIT_NO_JIT
|
|
|
|
#if !defined(ASMJIT_NO_JIT) && defined(TEST_ENVIRONMENT_HAS_JIT)
|
|
print_jit_runtime_info_and_test_execution();
|
|
#endif // !ASMJIT_NO_JIT && TEST_ENVIRONMENT_HAS_JIT
|
|
|
|
return 0;
|
|
}
|