t_ptrace_x86_wait.h revision 1.7 1 1.7 kamil /* $NetBSD: t_ptrace_x86_wait.h,v 1.7 2018/05/26 20:27:48 kamil Exp $ */
2 1.1 kamil
3 1.1 kamil /*-
4 1.1 kamil * Copyright (c) 2016 The NetBSD Foundation, Inc.
5 1.1 kamil * All rights reserved.
6 1.1 kamil *
7 1.1 kamil * Redistribution and use in source and binary forms, with or without
8 1.1 kamil * modification, are permitted provided that the following conditions
9 1.1 kamil * are met:
10 1.1 kamil * 1. Redistributions of source code must retain the above copyright
11 1.1 kamil * notice, this list of conditions and the following disclaimer.
12 1.1 kamil * 2. Redistributions in binary form must reproduce the above copyright
13 1.1 kamil * notice, this list of conditions and the following disclaimer in the
14 1.1 kamil * documentation and/or other materials provided with the distribution.
15 1.1 kamil *
16 1.1 kamil * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
17 1.1 kamil * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
18 1.1 kamil * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19 1.1 kamil * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
20 1.1 kamil * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
21 1.1 kamil * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
22 1.1 kamil * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
23 1.1 kamil * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
24 1.1 kamil * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
25 1.1 kamil * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
26 1.1 kamil * POSSIBILITY OF SUCH DAMAGE.
27 1.1 kamil */
28 1.1 kamil
29 1.1 kamil #if defined(__i386__) || defined(__x86_64__)
30 1.1 kamil union u {
31 1.1 kamil unsigned long raw;
32 1.1 kamil struct {
33 1.1 kamil unsigned long local_dr0_breakpoint : 1; /* 0 */
34 1.1 kamil unsigned long global_dr0_breakpoint : 1; /* 1 */
35 1.1 kamil unsigned long local_dr1_breakpoint : 1; /* 2 */
36 1.1 kamil unsigned long global_dr1_breakpoint : 1; /* 3 */
37 1.1 kamil unsigned long local_dr2_breakpoint : 1; /* 4 */
38 1.1 kamil unsigned long global_dr2_breakpoint : 1; /* 5 */
39 1.1 kamil unsigned long local_dr3_breakpoint : 1; /* 6 */
40 1.1 kamil unsigned long global_dr3_breakpoint : 1; /* 7 */
41 1.1 kamil unsigned long local_exact_breakpt : 1; /* 8 */
42 1.1 kamil unsigned long global_exact_breakpt : 1; /* 9 */
43 1.1 kamil unsigned long reserved_10 : 1; /* 10 */
44 1.1 kamil unsigned long rest_trans_memory : 1; /* 11 */
45 1.1 kamil unsigned long reserved_12 : 1; /* 12 */
46 1.1 kamil unsigned long general_detect_enable : 1; /* 13 */
47 1.1 kamil unsigned long reserved_14 : 1; /* 14 */
48 1.1 kamil unsigned long reserved_15 : 1; /* 15 */
49 1.1 kamil unsigned long condition_dr0 : 2; /* 16-17 */
50 1.1 kamil unsigned long len_dr0 : 2; /* 18-19 */
51 1.1 kamil unsigned long condition_dr1 : 2; /* 20-21 */
52 1.1 kamil unsigned long len_dr1 : 2; /* 22-23 */
53 1.1 kamil unsigned long condition_dr2 : 2; /* 24-25 */
54 1.1 kamil unsigned long len_dr2 : 2; /* 26-27 */
55 1.1 kamil unsigned long condition_dr3 : 2; /* 28-29 */
56 1.1 kamil unsigned long len_dr3 : 2; /* 30-31 */
57 1.1 kamil } bits;
58 1.1 kamil };
59 1.1 kamil
60 1.1 kamil ATF_TC(dbregs_print);
61 1.1 kamil ATF_TC_HEAD(dbregs_print, tc)
62 1.1 kamil {
63 1.1 kamil atf_tc_set_md_var(tc, "descr",
64 1.1 kamil "Verify plain PT_GETDBREGS with printing Debug Registers");
65 1.1 kamil }
66 1.1 kamil
67 1.1 kamil ATF_TC_BODY(dbregs_print, tc)
68 1.1 kamil {
69 1.1 kamil const int exitval = 5;
70 1.1 kamil const int sigval = SIGSTOP;
71 1.1 kamil pid_t child, wpid;
72 1.1 kamil #if defined(TWAIT_HAVE_STATUS)
73 1.1 kamil int status;
74 1.1 kamil #endif
75 1.1 kamil struct dbreg r;
76 1.1 kamil size_t i;
77 1.1 kamil
78 1.2 christos DPRINTF("Before forking process PID=%d\n", getpid());
79 1.2 christos SYSCALL_REQUIRE((child = fork()) != -1);
80 1.1 kamil if (child == 0) {
81 1.2 christos DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
82 1.1 kamil FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
83 1.1 kamil
84 1.2 christos DPRINTF("Before raising %s from child\n", strsignal(sigval));
85 1.1 kamil FORKEE_ASSERT(raise(sigval) == 0);
86 1.1 kamil
87 1.2 christos DPRINTF("Before exiting of the child process\n");
88 1.1 kamil _exit(exitval);
89 1.1 kamil }
90 1.2 christos DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
91 1.1 kamil
92 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
93 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
94 1.1 kamil
95 1.1 kamil validate_status_stopped(status, sigval);
96 1.1 kamil
97 1.2 christos DPRINTF("Call GETDBREGS for the child process\n");
98 1.2 christos SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r, 0) != -1);
99 1.1 kamil
100 1.2 christos DPRINTF("State of the debug registers:\n");
101 1.1 kamil for (i = 0; i < __arraycount(r.dr); i++)
102 1.2 christos DPRINTF("r[%zu]=%" PRIxREGISTER "\n", i, r.dr[i]);
103 1.1 kamil
104 1.2 christos DPRINTF("Before resuming the child process where it left off and "
105 1.1 kamil "without signal to be sent\n");
106 1.2 christos SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
107 1.1 kamil
108 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
109 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
110 1.1 kamil
111 1.1 kamil validate_status_exited(status, exitval);
112 1.1 kamil
113 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
114 1.1 kamil TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
115 1.1 kamil }
116 1.1 kamil
117 1.1 kamil
118 1.1 kamil enum dbreg_preserve_mode {
119 1.1 kamil dbreg_preserve_mode_none,
120 1.1 kamil dbreg_preserve_mode_yield,
121 1.1 kamil dbreg_preserve_mode_continued
122 1.1 kamil };
123 1.1 kamil
124 1.1 kamil static void
125 1.1 kamil dbreg_preserve(int reg, enum dbreg_preserve_mode mode)
126 1.1 kamil {
127 1.1 kamil const int exitval = 5;
128 1.1 kamil const int sigval = SIGSTOP;
129 1.1 kamil pid_t child, wpid;
130 1.1 kamil #if defined(TWAIT_HAVE_STATUS)
131 1.1 kamil int status;
132 1.1 kamil #endif
133 1.1 kamil struct dbreg r1;
134 1.1 kamil struct dbreg r2;
135 1.1 kamil size_t i;
136 1.1 kamil int watchme;
137 1.1 kamil
138 1.5 kamil if (!can_we_set_dbregs()) {
139 1.5 kamil atf_tc_skip("Either run this test as root or set sysctl(3) "
140 1.5 kamil "security.models.extensions.user_set_dbregs to 1");
141 1.5 kamil }
142 1.5 kamil
143 1.2 christos DPRINTF("Before forking process PID=%d\n", getpid());
144 1.2 christos SYSCALL_REQUIRE((child = fork()) != -1);
145 1.1 kamil if (child == 0) {
146 1.2 christos DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
147 1.1 kamil FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
148 1.1 kamil
149 1.2 christos DPRINTF("Before raising %s from child\n", strsignal(sigval));
150 1.1 kamil FORKEE_ASSERT(raise(sigval) == 0);
151 1.1 kamil
152 1.1 kamil if (mode == dbreg_preserve_mode_continued) {
153 1.2 christos DPRINTF("Before raising %s from child\n",
154 1.1 kamil strsignal(sigval));
155 1.1 kamil FORKEE_ASSERT(raise(sigval) == 0);
156 1.1 kamil }
157 1.1 kamil
158 1.2 christos DPRINTF("Before exiting of the child process\n");
159 1.1 kamil _exit(exitval);
160 1.1 kamil }
161 1.2 christos DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
162 1.1 kamil
163 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
164 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
165 1.1 kamil
166 1.1 kamil validate_status_stopped(status, sigval);
167 1.1 kamil
168 1.2 christos DPRINTF("Call GETDBREGS for the child process (r1)\n");
169 1.2 christos SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
170 1.1 kamil
171 1.2 christos DPRINTF("State of the debug registers (r1):\n");
172 1.1 kamil for (i = 0; i < __arraycount(r1.dr); i++)
173 1.2 christos DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
174 1.1 kamil
175 1.1 kamil r1.dr[reg] = (long)(intptr_t)&watchme;
176 1.2 christos DPRINTF("Set DR0 (r1.dr[%d]) to new value %" PRIxREGISTER "\n",
177 1.1 kamil reg, r1.dr[reg]);
178 1.1 kamil
179 1.2 christos DPRINTF("New state of the debug registers (r1):\n");
180 1.1 kamil for (i = 0; i < __arraycount(r1.dr); i++)
181 1.2 christos DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
182 1.1 kamil
183 1.2 christos DPRINTF("Call SETDBREGS for the child process (r1)\n");
184 1.2 christos SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
185 1.1 kamil
186 1.1 kamil switch (mode) {
187 1.1 kamil case dbreg_preserve_mode_none:
188 1.1 kamil break;
189 1.1 kamil case dbreg_preserve_mode_yield:
190 1.2 christos DPRINTF("Yields a processor voluntarily and gives other "
191 1.1 kamil "threads a chance to run without waiting for an "
192 1.1 kamil "involuntary preemptive switch\n");
193 1.1 kamil sched_yield();
194 1.1 kamil break;
195 1.1 kamil case dbreg_preserve_mode_continued:
196 1.2 christos DPRINTF("Call CONTINUE for the child process\n");
197 1.2 christos SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
198 1.1 kamil
199 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
200 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
201 1.1 kamil
202 1.1 kamil validate_status_stopped(status, sigval);
203 1.1 kamil break;
204 1.1 kamil }
205 1.1 kamil
206 1.2 christos DPRINTF("Call GETDBREGS for the child process (r2)\n");
207 1.2 christos SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r2, 0) != -1);
208 1.1 kamil
209 1.2 christos DPRINTF("Assert that (r1) and (r2) are the same\n");
210 1.2 christos SYSCALL_REQUIRE(memcmp(&r1, &r2, sizeof(r1)) == 0);
211 1.1 kamil
212 1.2 christos DPRINTF("Before resuming the child process where it left off and "
213 1.1 kamil "without signal to be sent\n");
214 1.2 christos SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
215 1.1 kamil
216 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
217 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
218 1.1 kamil
219 1.1 kamil validate_status_exited(status, exitval);
220 1.1 kamil
221 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
222 1.1 kamil TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
223 1.1 kamil }
224 1.1 kamil
225 1.1 kamil
226 1.1 kamil ATF_TC(dbregs_preserve_dr0);
227 1.1 kamil ATF_TC_HEAD(dbregs_preserve_dr0, tc)
228 1.1 kamil {
229 1.1 kamil atf_tc_set_md_var(tc, "descr",
230 1.1 kamil "Verify that setting DR0 is preserved across ptrace(2) calls");
231 1.1 kamil }
232 1.1 kamil
233 1.1 kamil ATF_TC_BODY(dbregs_preserve_dr0, tc)
234 1.1 kamil {
235 1.1 kamil dbreg_preserve(0, dbreg_preserve_mode_none);
236 1.1 kamil }
237 1.1 kamil
238 1.1 kamil ATF_TC(dbregs_preserve_dr1);
239 1.1 kamil ATF_TC_HEAD(dbregs_preserve_dr1, tc)
240 1.1 kamil {
241 1.1 kamil atf_tc_set_md_var(tc, "descr",
242 1.1 kamil "Verify that setting DR1 is preserved across ptrace(2) calls");
243 1.1 kamil }
244 1.1 kamil
245 1.1 kamil ATF_TC_BODY(dbregs_preserve_dr1, tc)
246 1.1 kamil {
247 1.1 kamil dbreg_preserve(1, dbreg_preserve_mode_none);
248 1.1 kamil }
249 1.1 kamil
250 1.1 kamil ATF_TC(dbregs_preserve_dr2);
251 1.1 kamil ATF_TC_HEAD(dbregs_preserve_dr2, tc)
252 1.1 kamil {
253 1.1 kamil atf_tc_set_md_var(tc, "descr",
254 1.1 kamil "Verify that setting DR2 is preserved across ptrace(2) calls");
255 1.1 kamil }
256 1.1 kamil
257 1.1 kamil ATF_TC_BODY(dbregs_preserve_dr2, tc)
258 1.1 kamil {
259 1.1 kamil dbreg_preserve(2, dbreg_preserve_mode_none);
260 1.1 kamil }
261 1.1 kamil
262 1.1 kamil ATF_TC(dbregs_preserve_dr3);
263 1.1 kamil ATF_TC_HEAD(dbregs_preserve_dr3, tc)
264 1.1 kamil {
265 1.1 kamil atf_tc_set_md_var(tc, "descr",
266 1.1 kamil "Verify that setting DR3 is preserved across ptrace(2) calls");
267 1.1 kamil }
268 1.1 kamil
269 1.1 kamil ATF_TC_BODY(dbregs_preserve_dr3, tc)
270 1.1 kamil {
271 1.1 kamil dbreg_preserve(3, dbreg_preserve_mode_none);
272 1.1 kamil }
273 1.1 kamil
274 1.1 kamil ATF_TC(dbregs_preserve_dr0_yield);
275 1.1 kamil ATF_TC_HEAD(dbregs_preserve_dr0_yield, tc)
276 1.1 kamil {
277 1.1 kamil atf_tc_set_md_var(tc, "descr",
278 1.1 kamil "Verify that setting DR0 is preserved across ptrace(2) calls with "
279 1.1 kamil "scheduler yield");
280 1.1 kamil }
281 1.1 kamil
282 1.1 kamil ATF_TC_BODY(dbregs_preserve_dr0_yield, tc)
283 1.1 kamil {
284 1.1 kamil dbreg_preserve(0, dbreg_preserve_mode_yield);
285 1.1 kamil }
286 1.1 kamil
287 1.1 kamil ATF_TC(dbregs_preserve_dr1_yield);
288 1.1 kamil ATF_TC_HEAD(dbregs_preserve_dr1_yield, tc)
289 1.1 kamil {
290 1.1 kamil atf_tc_set_md_var(tc, "descr",
291 1.1 kamil "Verify that setting DR1 is preserved across ptrace(2) calls with "
292 1.1 kamil "scheduler yield");
293 1.1 kamil }
294 1.1 kamil
295 1.1 kamil ATF_TC_BODY(dbregs_preserve_dr1_yield, tc)
296 1.1 kamil {
297 1.1 kamil dbreg_preserve(0, dbreg_preserve_mode_yield);
298 1.1 kamil }
299 1.1 kamil
300 1.1 kamil ATF_TC(dbregs_preserve_dr2_yield);
301 1.1 kamil ATF_TC_HEAD(dbregs_preserve_dr2_yield, tc)
302 1.1 kamil {
303 1.1 kamil atf_tc_set_md_var(tc, "descr",
304 1.1 kamil "Verify that setting DR2 is preserved across ptrace(2) calls with "
305 1.1 kamil "scheduler yield");
306 1.1 kamil }
307 1.1 kamil
308 1.1 kamil ATF_TC_BODY(dbregs_preserve_dr2_yield, tc)
309 1.1 kamil {
310 1.1 kamil dbreg_preserve(0, dbreg_preserve_mode_yield);
311 1.1 kamil }
312 1.1 kamil
313 1.1 kamil
314 1.1 kamil ATF_TC(dbregs_preserve_dr3_yield);
315 1.1 kamil ATF_TC_HEAD(dbregs_preserve_dr3_yield, tc)
316 1.1 kamil {
317 1.1 kamil atf_tc_set_md_var(tc, "descr",
318 1.1 kamil "Verify that setting DR3 is preserved across ptrace(2) calls with "
319 1.1 kamil "scheduler yield");
320 1.1 kamil }
321 1.1 kamil
322 1.1 kamil ATF_TC_BODY(dbregs_preserve_dr3_yield, tc)
323 1.1 kamil {
324 1.1 kamil dbreg_preserve(3, dbreg_preserve_mode_yield);
325 1.1 kamil }
326 1.1 kamil
327 1.1 kamil ATF_TC(dbregs_preserve_dr0_continued);
328 1.1 kamil ATF_TC_HEAD(dbregs_preserve_dr0_continued, tc)
329 1.1 kamil {
330 1.1 kamil atf_tc_set_md_var(tc, "descr",
331 1.1 kamil "Verify that setting DR0 is preserved across ptrace(2) calls and "
332 1.1 kamil "with continued child");
333 1.1 kamil }
334 1.1 kamil
335 1.1 kamil ATF_TC_BODY(dbregs_preserve_dr0_continued, tc)
336 1.1 kamil {
337 1.1 kamil dbreg_preserve(0, dbreg_preserve_mode_continued);
338 1.1 kamil }
339 1.1 kamil
340 1.1 kamil ATF_TC(dbregs_preserve_dr1_continued);
341 1.1 kamil ATF_TC_HEAD(dbregs_preserve_dr1_continued, tc)
342 1.1 kamil {
343 1.1 kamil atf_tc_set_md_var(tc, "descr",
344 1.1 kamil "Verify that setting DR1 is preserved across ptrace(2) calls and "
345 1.1 kamil "with continued child");
346 1.1 kamil }
347 1.1 kamil
348 1.1 kamil ATF_TC_BODY(dbregs_preserve_dr1_continued, tc)
349 1.1 kamil {
350 1.1 kamil dbreg_preserve(1, dbreg_preserve_mode_continued);
351 1.1 kamil }
352 1.1 kamil
353 1.1 kamil ATF_TC(dbregs_preserve_dr2_continued);
354 1.1 kamil ATF_TC_HEAD(dbregs_preserve_dr2_continued, tc)
355 1.1 kamil {
356 1.1 kamil atf_tc_set_md_var(tc, "descr",
357 1.1 kamil "Verify that setting DR2 is preserved across ptrace(2) calls and "
358 1.1 kamil "with continued child");
359 1.1 kamil }
360 1.1 kamil
361 1.1 kamil ATF_TC_BODY(dbregs_preserve_dr2_continued, tc)
362 1.1 kamil {
363 1.1 kamil dbreg_preserve(2, dbreg_preserve_mode_continued);
364 1.1 kamil }
365 1.1 kamil
366 1.1 kamil ATF_TC(dbregs_preserve_dr3_continued);
367 1.1 kamil ATF_TC_HEAD(dbregs_preserve_dr3_continued, tc)
368 1.1 kamil {
369 1.1 kamil atf_tc_set_md_var(tc, "descr",
370 1.1 kamil "Verify that setting DR3 is preserved across ptrace(2) calls and "
371 1.1 kamil "with continued child");
372 1.1 kamil }
373 1.1 kamil
374 1.1 kamil ATF_TC_BODY(dbregs_preserve_dr3_continued, tc)
375 1.1 kamil {
376 1.1 kamil dbreg_preserve(3, dbreg_preserve_mode_continued);
377 1.1 kamil }
378 1.1 kamil
379 1.1 kamil
380 1.1 kamil static void
381 1.1 kamil dbregs_trap_variable(int reg, int cond, int len, bool write)
382 1.1 kamil {
383 1.1 kamil const int exitval = 5;
384 1.1 kamil const int sigval = SIGSTOP;
385 1.1 kamil pid_t child, wpid;
386 1.1 kamil #if defined(TWAIT_HAVE_STATUS)
387 1.1 kamil int status;
388 1.1 kamil #endif
389 1.1 kamil struct dbreg r1;
390 1.1 kamil size_t i;
391 1.1 kamil volatile int watchme = 0;
392 1.1 kamil union u dr7;
393 1.1 kamil
394 1.1 kamil struct ptrace_siginfo info;
395 1.1 kamil memset(&info, 0, sizeof(info));
396 1.1 kamil
397 1.5 kamil if (!can_we_set_dbregs()) {
398 1.5 kamil atf_tc_skip("Either run this test as root or set sysctl(3) "
399 1.5 kamil "security.models.extensions.user_set_dbregs to 1");
400 1.5 kamil }
401 1.5 kamil
402 1.1 kamil dr7.raw = 0;
403 1.1 kamil switch (reg) {
404 1.1 kamil case 0:
405 1.1 kamil dr7.bits.global_dr0_breakpoint = 1;
406 1.1 kamil dr7.bits.condition_dr0 = cond;
407 1.1 kamil dr7.bits.len_dr0 = len;
408 1.1 kamil case 1:
409 1.1 kamil dr7.bits.global_dr1_breakpoint = 1;
410 1.1 kamil dr7.bits.condition_dr1 = cond;
411 1.1 kamil dr7.bits.len_dr1 = len;
412 1.1 kamil case 2:
413 1.1 kamil dr7.bits.global_dr2_breakpoint = 1;
414 1.1 kamil dr7.bits.condition_dr2 = cond;
415 1.1 kamil dr7.bits.len_dr2 = len;
416 1.1 kamil case 3:
417 1.1 kamil dr7.bits.global_dr3_breakpoint = 1;
418 1.1 kamil dr7.bits.condition_dr3 = cond;
419 1.1 kamil dr7.bits.len_dr3 = len;
420 1.1 kamil break;
421 1.1 kamil }
422 1.1 kamil
423 1.2 christos DPRINTF("Before forking process PID=%d\n", getpid());
424 1.2 christos SYSCALL_REQUIRE((child = fork()) != -1);
425 1.1 kamil if (child == 0) {
426 1.2 christos DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
427 1.1 kamil FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
428 1.1 kamil
429 1.2 christos DPRINTF("Before raising %s from child\n", strsignal(sigval));
430 1.1 kamil FORKEE_ASSERT(raise(sigval) == 0);
431 1.1 kamil
432 1.1 kamil if (write)
433 1.1 kamil watchme = 1;
434 1.1 kamil else
435 1.4 kamil printf("watchme=%d\n", watchme);
436 1.1 kamil
437 1.2 christos DPRINTF("Before raising %s from child\n", strsignal(sigval));
438 1.1 kamil FORKEE_ASSERT(raise(sigval) == 0);
439 1.1 kamil
440 1.2 christos DPRINTF("Before exiting of the child process\n");
441 1.1 kamil _exit(exitval);
442 1.1 kamil }
443 1.2 christos DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
444 1.1 kamil
445 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
446 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
447 1.1 kamil
448 1.1 kamil validate_status_stopped(status, sigval);
449 1.1 kamil
450 1.2 christos DPRINTF("Call GETDBREGS for the child process (r1)\n");
451 1.2 christos SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
452 1.1 kamil
453 1.2 christos DPRINTF("State of the debug registers (r1):\n");
454 1.1 kamil for (i = 0; i < __arraycount(r1.dr); i++)
455 1.2 christos DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
456 1.1 kamil
457 1.1 kamil r1.dr[reg] = (long)(intptr_t)&watchme;
458 1.2 christos DPRINTF("Set DR%d (r1.dr[%d]) to new value %" PRIxREGISTER "\n",
459 1.1 kamil reg, reg, r1.dr[reg]);
460 1.1 kamil
461 1.1 kamil r1.dr[7] = dr7.raw;
462 1.2 christos DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
463 1.1 kamil r1.dr[7]);
464 1.1 kamil
465 1.2 christos DPRINTF("New state of the debug registers (r1):\n");
466 1.1 kamil for (i = 0; i < __arraycount(r1.dr); i++)
467 1.2 christos DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
468 1.1 kamil
469 1.2 christos DPRINTF("Call SETDBREGS for the child process (r1)\n");
470 1.2 christos SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
471 1.1 kamil
472 1.2 christos DPRINTF("Call CONTINUE for the child process\n");
473 1.2 christos SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
474 1.1 kamil
475 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
476 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
477 1.1 kamil
478 1.1 kamil validate_status_stopped(status, SIGTRAP);
479 1.1 kamil
480 1.2 christos DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
481 1.2 christos SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
482 1.1 kamil
483 1.2 christos DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
484 1.2 christos DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
485 1.1 kamil info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
486 1.1 kamil info.psi_siginfo.si_errno);
487 1.1 kamil
488 1.2 christos DPRINTF("Before checking siginfo_t\n");
489 1.1 kamil ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, SIGTRAP);
490 1.1 kamil ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_DBREG);
491 1.1 kamil
492 1.2 christos DPRINTF("Call CONTINUE for the child process\n");
493 1.2 christos SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
494 1.1 kamil
495 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
496 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
497 1.1 kamil
498 1.1 kamil validate_status_stopped(status, sigval);
499 1.1 kamil
500 1.2 christos DPRINTF("Before resuming the child process where it left off and "
501 1.1 kamil "without signal to be sent\n");
502 1.2 christos SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
503 1.1 kamil
504 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
505 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
506 1.1 kamil
507 1.1 kamil validate_status_exited(status, exitval);
508 1.1 kamil
509 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
510 1.1 kamil TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
511 1.1 kamil }
512 1.1 kamil
513 1.1 kamil ATF_TC(dbregs_dr0_trap_variable_writeonly_byte);
514 1.1 kamil ATF_TC_HEAD(dbregs_dr0_trap_variable_writeonly_byte, tc)
515 1.1 kamil {
516 1.1 kamil atf_tc_set_md_var(tc, "descr",
517 1.1 kamil "Verify that setting trap with DR0 triggers SIGTRAP "
518 1.1 kamil "(break on data writes only and 1 byte mode)");
519 1.1 kamil }
520 1.1 kamil
521 1.1 kamil ATF_TC_BODY(dbregs_dr0_trap_variable_writeonly_byte, tc)
522 1.1 kamil {
523 1.1 kamil /* 0b01 -- break on data write only */
524 1.1 kamil /* 0b00 -- 1 byte */
525 1.1 kamil
526 1.1 kamil dbregs_trap_variable(0, 1, 0, true);
527 1.1 kamil }
528 1.1 kamil
529 1.1 kamil ATF_TC(dbregs_dr1_trap_variable_writeonly_byte);
530 1.1 kamil ATF_TC_HEAD(dbregs_dr1_trap_variable_writeonly_byte, tc)
531 1.1 kamil {
532 1.1 kamil atf_tc_set_md_var(tc, "descr",
533 1.1 kamil "Verify that setting trap with DR1 triggers SIGTRAP "
534 1.1 kamil "(break on data writes only and 1 byte mode)");
535 1.1 kamil }
536 1.1 kamil
537 1.1 kamil ATF_TC_BODY(dbregs_dr1_trap_variable_writeonly_byte, tc)
538 1.1 kamil {
539 1.1 kamil /* 0b01 -- break on data write only */
540 1.1 kamil /* 0b00 -- 1 byte */
541 1.1 kamil
542 1.1 kamil dbregs_trap_variable(1, 1, 0, true);
543 1.1 kamil }
544 1.1 kamil
545 1.1 kamil ATF_TC(dbregs_dr2_trap_variable_writeonly_byte);
546 1.1 kamil ATF_TC_HEAD(dbregs_dr2_trap_variable_writeonly_byte, tc)
547 1.1 kamil {
548 1.1 kamil atf_tc_set_md_var(tc, "descr",
549 1.1 kamil "Verify that setting trap with DR2 triggers SIGTRAP "
550 1.1 kamil "(break on data writes only and 1 byte mode)");
551 1.1 kamil }
552 1.1 kamil
553 1.1 kamil ATF_TC_BODY(dbregs_dr2_trap_variable_writeonly_byte, tc)
554 1.1 kamil {
555 1.1 kamil /* 0b01 -- break on data write only */
556 1.1 kamil /* 0b00 -- 1 byte */
557 1.1 kamil
558 1.1 kamil dbregs_trap_variable(2, 1, 0, true);
559 1.1 kamil }
560 1.1 kamil
561 1.1 kamil ATF_TC(dbregs_dr3_trap_variable_writeonly_byte);
562 1.1 kamil ATF_TC_HEAD(dbregs_dr3_trap_variable_writeonly_byte, tc)
563 1.1 kamil {
564 1.1 kamil atf_tc_set_md_var(tc, "descr",
565 1.1 kamil "Verify that setting trap with DR3 triggers SIGTRAP "
566 1.1 kamil "(break on data writes only and 1 byte mode)");
567 1.1 kamil }
568 1.1 kamil
569 1.1 kamil ATF_TC_BODY(dbregs_dr3_trap_variable_writeonly_byte, tc)
570 1.1 kamil {
571 1.1 kamil /* 0b01 -- break on data write only */
572 1.1 kamil /* 0b00 -- 1 byte */
573 1.1 kamil
574 1.1 kamil dbregs_trap_variable(3, 1, 0, true);
575 1.1 kamil }
576 1.1 kamil
577 1.1 kamil ATF_TC(dbregs_dr0_trap_variable_writeonly_2bytes);
578 1.1 kamil ATF_TC_HEAD(dbregs_dr0_trap_variable_writeonly_2bytes, tc)
579 1.1 kamil {
580 1.1 kamil atf_tc_set_md_var(tc, "descr",
581 1.1 kamil "Verify that setting trap with DR0 triggers SIGTRAP "
582 1.1 kamil "(break on data writes only and 2 bytes mode)");
583 1.1 kamil }
584 1.1 kamil
585 1.1 kamil ATF_TC_BODY(dbregs_dr0_trap_variable_writeonly_2bytes, tc)
586 1.1 kamil {
587 1.1 kamil /* 0b01 -- break on data write only */
588 1.1 kamil /* 0b01 -- 2 bytes */
589 1.1 kamil
590 1.1 kamil dbregs_trap_variable(0, 1, 1, true);
591 1.1 kamil }
592 1.1 kamil
593 1.1 kamil ATF_TC(dbregs_dr1_trap_variable_writeonly_2bytes);
594 1.1 kamil ATF_TC_HEAD(dbregs_dr1_trap_variable_writeonly_2bytes, tc)
595 1.1 kamil {
596 1.1 kamil atf_tc_set_md_var(tc, "descr",
597 1.1 kamil "Verify that setting trap with DR1 triggers SIGTRAP "
598 1.1 kamil "(break on data writes only and 2 bytes mode)");
599 1.1 kamil }
600 1.1 kamil
601 1.1 kamil ATF_TC_BODY(dbregs_dr1_trap_variable_writeonly_2bytes, tc)
602 1.1 kamil {
603 1.1 kamil /* 0b01 -- break on data write only */
604 1.1 kamil /* 0b01 -- 2 bytes */
605 1.1 kamil
606 1.1 kamil dbregs_trap_variable(1, 1, 1, true);
607 1.1 kamil }
608 1.1 kamil
609 1.1 kamil ATF_TC(dbregs_dr2_trap_variable_writeonly_2bytes);
610 1.1 kamil ATF_TC_HEAD(dbregs_dr2_trap_variable_writeonly_2bytes, tc)
611 1.1 kamil {
612 1.1 kamil atf_tc_set_md_var(tc, "descr",
613 1.1 kamil "Verify that setting trap with DR2 triggers SIGTRAP "
614 1.1 kamil "(break on data writes only and 2 bytes mode)");
615 1.1 kamil }
616 1.1 kamil
617 1.1 kamil ATF_TC_BODY(dbregs_dr2_trap_variable_writeonly_2bytes, tc)
618 1.1 kamil {
619 1.1 kamil /* 0b01 -- break on data write only */
620 1.1 kamil /* 0b01 -- 2 bytes */
621 1.1 kamil
622 1.1 kamil dbregs_trap_variable(2, 1, 1, true);
623 1.1 kamil }
624 1.1 kamil
625 1.1 kamil ATF_TC(dbregs_dr3_trap_variable_writeonly_2bytes);
626 1.1 kamil ATF_TC_HEAD(dbregs_dr3_trap_variable_writeonly_2bytes, tc)
627 1.1 kamil {
628 1.1 kamil atf_tc_set_md_var(tc, "descr",
629 1.1 kamil "Verify that setting trap with DR3 triggers SIGTRAP "
630 1.1 kamil "(break on data writes only and 2 bytes mode)");
631 1.1 kamil }
632 1.1 kamil
633 1.1 kamil ATF_TC_BODY(dbregs_dr3_trap_variable_writeonly_2bytes, tc)
634 1.1 kamil {
635 1.1 kamil /* 0b01 -- break on data write only */
636 1.1 kamil /* 0b01 -- 2 bytes */
637 1.1 kamil
638 1.1 kamil dbregs_trap_variable(3, 1, 1, true);
639 1.1 kamil }
640 1.1 kamil
641 1.1 kamil ATF_TC(dbregs_dr0_trap_variable_writeonly_4bytes);
642 1.1 kamil ATF_TC_HEAD(dbregs_dr0_trap_variable_writeonly_4bytes, tc)
643 1.1 kamil {
644 1.1 kamil atf_tc_set_md_var(tc, "descr",
645 1.1 kamil "Verify that setting trap with DR0 triggers SIGTRAP "
646 1.1 kamil "(break on data writes only and 4 bytes mode)");
647 1.1 kamil }
648 1.1 kamil
649 1.1 kamil ATF_TC_BODY(dbregs_dr0_trap_variable_writeonly_4bytes, tc)
650 1.1 kamil {
651 1.1 kamil /* 0b01 -- break on data write only */
652 1.1 kamil /* 0b11 -- 4 bytes */
653 1.1 kamil
654 1.1 kamil dbregs_trap_variable(0, 1, 3, true);
655 1.1 kamil }
656 1.1 kamil
657 1.1 kamil ATF_TC(dbregs_dr1_trap_variable_writeonly_4bytes);
658 1.1 kamil ATF_TC_HEAD(dbregs_dr1_trap_variable_writeonly_4bytes, tc)
659 1.1 kamil {
660 1.1 kamil atf_tc_set_md_var(tc, "descr",
661 1.1 kamil "Verify that setting trap with DR1 triggers SIGTRAP "
662 1.1 kamil "(break on data writes only and 4 bytes mode)");
663 1.1 kamil }
664 1.1 kamil
665 1.1 kamil ATF_TC_BODY(dbregs_dr1_trap_variable_writeonly_4bytes, tc)
666 1.1 kamil {
667 1.1 kamil /* 0b01 -- break on data write only */
668 1.1 kamil /* 0b11 -- 4 bytes */
669 1.1 kamil
670 1.1 kamil dbregs_trap_variable(1, 1, 3, true);
671 1.1 kamil }
672 1.1 kamil
673 1.1 kamil ATF_TC(dbregs_dr2_trap_variable_writeonly_4bytes);
674 1.1 kamil ATF_TC_HEAD(dbregs_dr2_trap_variable_writeonly_4bytes, tc)
675 1.1 kamil {
676 1.1 kamil atf_tc_set_md_var(tc, "descr",
677 1.1 kamil "Verify that setting trap with DR2 triggers SIGTRAP "
678 1.1 kamil "(break on data writes only and 4 bytes mode)");
679 1.1 kamil }
680 1.1 kamil
681 1.1 kamil ATF_TC_BODY(dbregs_dr2_trap_variable_writeonly_4bytes, tc)
682 1.1 kamil {
683 1.1 kamil /* 0b01 -- break on data write only */
684 1.1 kamil /* 0b11 -- 4 bytes */
685 1.1 kamil
686 1.1 kamil dbregs_trap_variable(2, 1, 3, true);
687 1.1 kamil }
688 1.1 kamil
689 1.1 kamil ATF_TC(dbregs_dr3_trap_variable_writeonly_4bytes);
690 1.1 kamil ATF_TC_HEAD(dbregs_dr3_trap_variable_writeonly_4bytes, tc)
691 1.1 kamil {
692 1.1 kamil atf_tc_set_md_var(tc, "descr",
693 1.1 kamil "Verify that setting trap with DR3 triggers SIGTRAP "
694 1.1 kamil "(break on data writes only and 4 bytes mode)");
695 1.1 kamil }
696 1.1 kamil
697 1.1 kamil ATF_TC_BODY(dbregs_dr3_trap_variable_writeonly_4bytes, tc)
698 1.1 kamil {
699 1.1 kamil /* 0b01 -- break on data write only */
700 1.1 kamil /* 0b11 -- 4 bytes */
701 1.1 kamil
702 1.1 kamil dbregs_trap_variable(3, 1, 3, true);
703 1.1 kamil }
704 1.1 kamil
705 1.1 kamil ATF_TC(dbregs_dr0_trap_variable_readwrite_write_byte);
706 1.1 kamil ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_write_byte, tc)
707 1.1 kamil {
708 1.1 kamil atf_tc_set_md_var(tc, "descr",
709 1.1 kamil "Verify that setting trap with DR0 triggers SIGTRAP "
710 1.1 kamil "(break on data read/write trap in read 1 byte mode)");
711 1.1 kamil }
712 1.1 kamil
713 1.1 kamil ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_write_byte, tc)
714 1.1 kamil {
715 1.1 kamil /* 0b11 -- break on data write&read */
716 1.1 kamil /* 0b00 -- 1 byte */
717 1.1 kamil
718 1.1 kamil dbregs_trap_variable(0, 3, 0, true);
719 1.1 kamil }
720 1.1 kamil
721 1.1 kamil ATF_TC(dbregs_dr1_trap_variable_readwrite_write_byte);
722 1.1 kamil ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_write_byte, tc)
723 1.1 kamil {
724 1.1 kamil atf_tc_set_md_var(tc, "descr",
725 1.1 kamil "Verify that setting trap with DR1 triggers SIGTRAP "
726 1.1 kamil "(break on data read/write trap in read 1 byte mode)");
727 1.1 kamil }
728 1.1 kamil
729 1.1 kamil ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_write_byte, tc)
730 1.1 kamil {
731 1.1 kamil /* 0b11 -- break on data write&read */
732 1.1 kamil /* 0b00 -- 1 byte */
733 1.1 kamil
734 1.1 kamil dbregs_trap_variable(1, 3, 0, true);
735 1.1 kamil }
736 1.1 kamil
737 1.1 kamil ATF_TC(dbregs_dr2_trap_variable_readwrite_write_byte);
738 1.1 kamil ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_write_byte, tc)
739 1.1 kamil {
740 1.1 kamil atf_tc_set_md_var(tc, "descr",
741 1.1 kamil "Verify that setting trap with DR2 triggers SIGTRAP "
742 1.1 kamil "(break on data read/write trap in read 1 byte mode)");
743 1.1 kamil }
744 1.1 kamil
745 1.1 kamil ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_write_byte, tc)
746 1.1 kamil {
747 1.1 kamil /* 0b11 -- break on data write&read */
748 1.1 kamil /* 0b00 -- 1 byte */
749 1.1 kamil
750 1.1 kamil dbregs_trap_variable(2, 3, 0, true);
751 1.1 kamil }
752 1.1 kamil
753 1.1 kamil ATF_TC(dbregs_dr3_trap_variable_readwrite_write_byte);
754 1.1 kamil ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_write_byte, tc)
755 1.1 kamil {
756 1.1 kamil atf_tc_set_md_var(tc, "descr",
757 1.1 kamil "Verify that setting trap with DR3 triggers SIGTRAP "
758 1.1 kamil "(break on data read/write trap in read 1 byte mode)");
759 1.1 kamil }
760 1.1 kamil
761 1.1 kamil ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_write_byte, tc)
762 1.1 kamil {
763 1.1 kamil /* 0b11 -- break on data write&read */
764 1.1 kamil /* 0b00 -- 1 byte */
765 1.1 kamil
766 1.1 kamil dbregs_trap_variable(3, 3, 0, true);
767 1.1 kamil }
768 1.1 kamil
769 1.1 kamil ATF_TC(dbregs_dr0_trap_variable_readwrite_write_2bytes);
770 1.1 kamil ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_write_2bytes, tc)
771 1.1 kamil {
772 1.1 kamil atf_tc_set_md_var(tc, "descr",
773 1.1 kamil "Verify that setting trap with DR0 triggers SIGTRAP "
774 1.1 kamil "(break on data read/write trap in read 2 bytes mode)");
775 1.1 kamil }
776 1.1 kamil
777 1.1 kamil ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_write_2bytes, tc)
778 1.1 kamil {
779 1.1 kamil /* 0b11 -- break on data write&read */
780 1.1 kamil /* 0b01 -- 2 bytes */
781 1.1 kamil
782 1.1 kamil dbregs_trap_variable(0, 3, 1, true);
783 1.1 kamil }
784 1.1 kamil
785 1.1 kamil ATF_TC(dbregs_dr1_trap_variable_readwrite_write_2bytes);
786 1.1 kamil ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_write_2bytes, tc)
787 1.1 kamil {
788 1.1 kamil atf_tc_set_md_var(tc, "descr",
789 1.1 kamil "Verify that setting trap with DR1 triggers SIGTRAP "
790 1.1 kamil "(break on data read/write trap in read 2 bytes mode)");
791 1.1 kamil }
792 1.1 kamil
793 1.1 kamil ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_write_2bytes, tc)
794 1.1 kamil {
795 1.1 kamil /* 0b11 -- break on data write&read */
796 1.1 kamil /* 0b01 -- 2 bytes */
797 1.1 kamil
798 1.1 kamil dbregs_trap_variable(1, 3, 1, true);
799 1.1 kamil }
800 1.1 kamil
801 1.1 kamil ATF_TC(dbregs_dr2_trap_variable_readwrite_write_2bytes);
802 1.1 kamil ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_write_2bytes, tc)
803 1.1 kamil {
804 1.1 kamil atf_tc_set_md_var(tc, "descr",
805 1.1 kamil "Verify that setting trap with DR2 triggers SIGTRAP "
806 1.1 kamil "(break on data read/write trap in read 2 bytes mode)");
807 1.1 kamil }
808 1.1 kamil
809 1.1 kamil ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_write_2bytes, tc)
810 1.1 kamil {
811 1.1 kamil /* 0b11 -- break on data write&read */
812 1.1 kamil /* 0b01 -- 2 bytes */
813 1.1 kamil
814 1.1 kamil dbregs_trap_variable(2, 3, 1, true);
815 1.1 kamil }
816 1.1 kamil
817 1.1 kamil ATF_TC(dbregs_dr3_trap_variable_readwrite_write_2bytes);
818 1.1 kamil ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_write_2bytes, tc)
819 1.1 kamil {
820 1.1 kamil atf_tc_set_md_var(tc, "descr",
821 1.1 kamil "Verify that setting trap with DR3 triggers SIGTRAP "
822 1.1 kamil "(break on data read/write trap in read 2 bytes mode)");
823 1.1 kamil }
824 1.1 kamil
825 1.1 kamil ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_write_2bytes, tc)
826 1.1 kamil {
827 1.1 kamil /* 0b11 -- break on data write&read */
828 1.1 kamil /* 0b01 -- 2 bytes */
829 1.1 kamil
830 1.1 kamil dbregs_trap_variable(3, 3, 1, true);
831 1.1 kamil }
832 1.1 kamil
833 1.1 kamil ATF_TC(dbregs_dr0_trap_variable_readwrite_write_4bytes);
834 1.1 kamil ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_write_4bytes, tc)
835 1.1 kamil {
836 1.1 kamil atf_tc_set_md_var(tc, "descr",
837 1.1 kamil "Verify that setting trap with DR0 triggers SIGTRAP "
838 1.1 kamil "(break on data read/write trap in read 4 bytes mode)");
839 1.1 kamil }
840 1.1 kamil
841 1.1 kamil ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_write_4bytes, tc)
842 1.1 kamil {
843 1.1 kamil /* 0b11 -- break on data write&read */
844 1.1 kamil /* 0b11 -- 4 bytes */
845 1.1 kamil
846 1.1 kamil dbregs_trap_variable(0, 3, 3, true);
847 1.1 kamil }
848 1.1 kamil
849 1.1 kamil ATF_TC(dbregs_dr1_trap_variable_readwrite_write_4bytes);
850 1.1 kamil ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_write_4bytes, tc)
851 1.1 kamil {
852 1.1 kamil atf_tc_set_md_var(tc, "descr",
853 1.1 kamil "Verify that setting trap with DR1 triggers SIGTRAP "
854 1.1 kamil "(break on data read/write trap in read 4 bytes mode)");
855 1.1 kamil }
856 1.1 kamil
857 1.1 kamil ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_write_4bytes, tc)
858 1.1 kamil {
859 1.1 kamil /* 0b11 -- break on data write&read */
860 1.1 kamil /* 0b11 -- 4 bytes */
861 1.1 kamil
862 1.1 kamil dbregs_trap_variable(1, 3, 3, true);
863 1.1 kamil }
864 1.1 kamil
865 1.1 kamil ATF_TC(dbregs_dr2_trap_variable_readwrite_write_4bytes);
866 1.1 kamil ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_write_4bytes, tc)
867 1.1 kamil {
868 1.1 kamil atf_tc_set_md_var(tc, "descr",
869 1.1 kamil "Verify that setting trap with DR2 triggers SIGTRAP "
870 1.1 kamil "(break on data read/write trap in read 4 bytes mode)");
871 1.1 kamil }
872 1.1 kamil
873 1.1 kamil ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_write_4bytes, tc)
874 1.1 kamil {
875 1.1 kamil /* 0b11 -- break on data write&read */
876 1.1 kamil /* 0b11 -- 4 bytes */
877 1.1 kamil
878 1.1 kamil dbregs_trap_variable(2, 3, 3, true);
879 1.1 kamil }
880 1.1 kamil
881 1.1 kamil ATF_TC(dbregs_dr3_trap_variable_readwrite_write_4bytes);
882 1.1 kamil ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_write_4bytes, tc)
883 1.1 kamil {
884 1.1 kamil atf_tc_set_md_var(tc, "descr",
885 1.1 kamil "Verify that setting trap with DR3 triggers SIGTRAP "
886 1.1 kamil "(break on data read/write trap in read 4 bytes mode)");
887 1.1 kamil }
888 1.1 kamil
889 1.1 kamil ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_write_4bytes, tc)
890 1.1 kamil {
891 1.1 kamil /* 0b11 -- break on data write&read */
892 1.1 kamil /* 0b11 -- 4 bytes */
893 1.1 kamil
894 1.1 kamil dbregs_trap_variable(3, 3, 3, true);
895 1.1 kamil }
896 1.1 kamil
897 1.1 kamil ATF_TC(dbregs_dr0_trap_variable_readwrite_read_byte);
898 1.1 kamil ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_read_byte, tc)
899 1.1 kamil {
900 1.1 kamil atf_tc_set_md_var(tc, "descr",
901 1.1 kamil "Verify that setting trap with DR0 triggers SIGTRAP "
902 1.1 kamil "(break on data read/write trap in write 1 byte mode)");
903 1.1 kamil }
904 1.1 kamil
905 1.1 kamil ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_read_byte, tc)
906 1.1 kamil {
907 1.1 kamil /* 0b11 -- break on data write&read */
908 1.1 kamil /* 0b00 -- 1 byte */
909 1.1 kamil
910 1.1 kamil dbregs_trap_variable(0, 3, 0, false);
911 1.1 kamil }
912 1.1 kamil
913 1.1 kamil ATF_TC(dbregs_dr1_trap_variable_readwrite_read_byte);
914 1.1 kamil ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_read_byte, tc)
915 1.1 kamil {
916 1.1 kamil atf_tc_set_md_var(tc, "descr",
917 1.1 kamil "Verify that setting trap with DR1 triggers SIGTRAP "
918 1.1 kamil "(break on data read/write trap in write 1 byte mode)");
919 1.1 kamil }
920 1.1 kamil
921 1.1 kamil ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_read_byte, tc)
922 1.1 kamil {
923 1.1 kamil /* 0b11 -- break on data write&read */
924 1.1 kamil /* 0b00 -- 1 byte */
925 1.1 kamil
926 1.1 kamil dbregs_trap_variable(1, 3, 0, false);
927 1.1 kamil }
928 1.1 kamil
929 1.1 kamil ATF_TC(dbregs_dr2_trap_variable_readwrite_read_byte);
930 1.1 kamil ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_read_byte, tc)
931 1.1 kamil {
932 1.1 kamil atf_tc_set_md_var(tc, "descr",
933 1.1 kamil "Verify that setting trap with DR2 triggers SIGTRAP "
934 1.1 kamil "(break on data read/write trap in write 1 byte mode)");
935 1.1 kamil }
936 1.1 kamil
937 1.1 kamil ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_read_byte, tc)
938 1.1 kamil {
939 1.1 kamil /* 0b11 -- break on data write&read */
940 1.1 kamil /* 0b00 -- 1 byte */
941 1.1 kamil
942 1.1 kamil dbregs_trap_variable(2, 3, 0, false);
943 1.1 kamil }
944 1.1 kamil
945 1.1 kamil ATF_TC(dbregs_dr3_trap_variable_readwrite_read_byte);
946 1.1 kamil ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_read_byte, tc)
947 1.1 kamil {
948 1.1 kamil atf_tc_set_md_var(tc, "descr",
949 1.1 kamil "Verify that setting trap with DR3 triggers SIGTRAP "
950 1.1 kamil "(break on data read/write trap in write 1 byte mode)");
951 1.1 kamil }
952 1.1 kamil
953 1.1 kamil ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_read_byte, tc)
954 1.1 kamil {
955 1.1 kamil /* 0b11 -- break on data write&read */
956 1.1 kamil /* 0b00 -- 1 byte */
957 1.1 kamil
958 1.1 kamil dbregs_trap_variable(3, 3, 0, false);
959 1.1 kamil }
960 1.1 kamil
961 1.1 kamil ATF_TC(dbregs_dr0_trap_variable_readwrite_read_2bytes);
962 1.1 kamil ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_read_2bytes, tc)
963 1.1 kamil {
964 1.1 kamil atf_tc_set_md_var(tc, "descr",
965 1.1 kamil "Verify that setting trap with DR0 triggers SIGTRAP "
966 1.1 kamil "(break on data read/write trap in write 2 bytes mode)");
967 1.1 kamil }
968 1.1 kamil
969 1.1 kamil ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_read_2bytes, tc)
970 1.1 kamil {
971 1.1 kamil /* 0b11 -- break on data write&read */
972 1.1 kamil /* 0b01 -- 2 bytes */
973 1.1 kamil
974 1.1 kamil dbregs_trap_variable(0, 3, 1, false);
975 1.1 kamil }
976 1.1 kamil
977 1.1 kamil ATF_TC(dbregs_dr1_trap_variable_readwrite_read_2bytes);
978 1.1 kamil ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_read_2bytes, tc)
979 1.1 kamil {
980 1.1 kamil atf_tc_set_md_var(tc, "descr",
981 1.1 kamil "Verify that setting trap with DR1 triggers SIGTRAP "
982 1.1 kamil "(break on data read/write trap in write 2 bytes mode)");
983 1.1 kamil }
984 1.1 kamil
985 1.1 kamil ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_read_2bytes, tc)
986 1.1 kamil {
987 1.1 kamil /* 0b11 -- break on data write&read */
988 1.1 kamil /* 0b01 -- 2 bytes */
989 1.1 kamil
990 1.1 kamil dbregs_trap_variable(1, 3, 1, false);
991 1.1 kamil }
992 1.1 kamil
993 1.1 kamil ATF_TC(dbregs_dr2_trap_variable_readwrite_read_2bytes);
994 1.1 kamil ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_read_2bytes, tc)
995 1.1 kamil {
996 1.1 kamil atf_tc_set_md_var(tc, "descr",
997 1.1 kamil "Verify that setting trap with DR2 triggers SIGTRAP "
998 1.1 kamil "(break on data read/write trap in write 2 bytes mode)");
999 1.1 kamil }
1000 1.1 kamil
1001 1.1 kamil ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_read_2bytes, tc)
1002 1.1 kamil {
1003 1.1 kamil /* 0b11 -- break on data write&read */
1004 1.1 kamil /* 0b01 -- 2 bytes */
1005 1.1 kamil
1006 1.1 kamil dbregs_trap_variable(2, 3, 1, false);
1007 1.1 kamil }
1008 1.1 kamil
1009 1.1 kamil ATF_TC(dbregs_dr3_trap_variable_readwrite_read_2bytes);
1010 1.1 kamil ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_read_2bytes, tc)
1011 1.1 kamil {
1012 1.1 kamil atf_tc_set_md_var(tc, "descr",
1013 1.1 kamil "Verify that setting trap with DR3 triggers SIGTRAP "
1014 1.1 kamil "(break on data read/write trap in write 2 bytes mode)");
1015 1.1 kamil }
1016 1.1 kamil
1017 1.1 kamil ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_read_2bytes, tc)
1018 1.1 kamil {
1019 1.1 kamil /* 0b11 -- break on data write&read */
1020 1.1 kamil /* 0b01 -- 2 bytes */
1021 1.1 kamil
1022 1.1 kamil dbregs_trap_variable(3, 3, 1, false);
1023 1.1 kamil }
1024 1.1 kamil
1025 1.1 kamil ATF_TC(dbregs_dr0_trap_variable_readwrite_read_4bytes);
1026 1.1 kamil ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_read_4bytes, tc)
1027 1.1 kamil {
1028 1.1 kamil atf_tc_set_md_var(tc, "descr",
1029 1.1 kamil "Verify that setting trap with DR0 triggers SIGTRAP "
1030 1.1 kamil "(break on data read/write trap in write 4 bytes mode)");
1031 1.1 kamil }
1032 1.1 kamil
1033 1.1 kamil ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_read_4bytes, tc)
1034 1.1 kamil {
1035 1.1 kamil /* 0b11 -- break on data write&read */
1036 1.1 kamil /* 0b11 -- 4 bytes */
1037 1.1 kamil
1038 1.1 kamil dbregs_trap_variable(0, 3, 3, false);
1039 1.1 kamil }
1040 1.1 kamil
1041 1.1 kamil ATF_TC(dbregs_dr1_trap_variable_readwrite_read_4bytes);
1042 1.1 kamil ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_read_4bytes, tc)
1043 1.1 kamil {
1044 1.1 kamil atf_tc_set_md_var(tc, "descr",
1045 1.1 kamil "Verify that setting trap with DR1 triggers SIGTRAP "
1046 1.1 kamil "(break on data read/write trap in write 4 bytes mode)");
1047 1.1 kamil }
1048 1.1 kamil
1049 1.1 kamil ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_read_4bytes, tc)
1050 1.1 kamil {
1051 1.1 kamil /* 0b11 -- break on data write&read */
1052 1.1 kamil /* 0b11 -- 4 bytes */
1053 1.1 kamil
1054 1.1 kamil dbregs_trap_variable(1, 3, 3, false);
1055 1.1 kamil }
1056 1.1 kamil
1057 1.1 kamil ATF_TC(dbregs_dr2_trap_variable_readwrite_read_4bytes);
1058 1.1 kamil ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_read_4bytes, tc)
1059 1.1 kamil {
1060 1.1 kamil atf_tc_set_md_var(tc, "descr",
1061 1.1 kamil "Verify that setting trap with DR2 triggers SIGTRAP "
1062 1.1 kamil "(break on data read/write trap in write 4 bytes mode)");
1063 1.1 kamil }
1064 1.1 kamil
1065 1.1 kamil ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_read_4bytes, tc)
1066 1.1 kamil {
1067 1.1 kamil /* 0b11 -- break on data write&read */
1068 1.1 kamil /* 0b11 -- 4 bytes */
1069 1.1 kamil
1070 1.1 kamil dbregs_trap_variable(2, 3, 3, false);
1071 1.1 kamil }
1072 1.1 kamil
1073 1.1 kamil ATF_TC(dbregs_dr3_trap_variable_readwrite_read_4bytes);
1074 1.1 kamil ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_read_4bytes, tc)
1075 1.1 kamil {
1076 1.1 kamil atf_tc_set_md_var(tc, "descr",
1077 1.1 kamil "Verify that setting trap with DR3 triggers SIGTRAP "
1078 1.1 kamil "(break on data read/write trap in write 4 bytes mode)");
1079 1.1 kamil }
1080 1.1 kamil
1081 1.1 kamil ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_read_4bytes, tc)
1082 1.1 kamil {
1083 1.1 kamil /* 0b11 -- break on data write&read */
1084 1.1 kamil /* 0b11 -- 4 bytes */
1085 1.1 kamil
1086 1.1 kamil dbregs_trap_variable(3, 3, 3, false);
1087 1.1 kamil }
1088 1.1 kamil
1089 1.1 kamil #if defined(HAVE_DBREGS)
1090 1.1 kamil ATF_TC(dbregs_dr0_trap_code);
1091 1.1 kamil ATF_TC_HEAD(dbregs_dr0_trap_code, tc)
1092 1.1 kamil {
1093 1.1 kamil atf_tc_set_md_var(tc, "descr",
1094 1.1 kamil "Verify that setting trap with DR0 triggers SIGTRAP "
1095 1.1 kamil "(break on code execution trap)");
1096 1.1 kamil }
1097 1.1 kamil
1098 1.1 kamil ATF_TC_BODY(dbregs_dr0_trap_code, tc)
1099 1.1 kamil {
1100 1.1 kamil const int exitval = 5;
1101 1.1 kamil const int sigval = SIGSTOP;
1102 1.1 kamil pid_t child, wpid;
1103 1.1 kamil #if defined(TWAIT_HAVE_STATUS)
1104 1.1 kamil int status;
1105 1.1 kamil #endif
1106 1.1 kamil struct dbreg r1;
1107 1.1 kamil size_t i;
1108 1.1 kamil volatile int watchme = 1;
1109 1.1 kamil union u dr7;
1110 1.1 kamil
1111 1.1 kamil struct ptrace_siginfo info;
1112 1.1 kamil memset(&info, 0, sizeof(info));
1113 1.1 kamil
1114 1.5 kamil if (!can_we_set_dbregs()) {
1115 1.5 kamil atf_tc_skip("Either run this test as root or set sysctl(3) "
1116 1.5 kamil "security.models.extensions.user_set_dbregs to 1");
1117 1.5 kamil }
1118 1.5 kamil
1119 1.1 kamil dr7.raw = 0;
1120 1.1 kamil dr7.bits.global_dr0_breakpoint = 1;
1121 1.1 kamil dr7.bits.condition_dr0 = 0; /* 0b00 -- break on code execution */
1122 1.1 kamil dr7.bits.len_dr0 = 0; /* 0b00 -- 1 byte */
1123 1.1 kamil
1124 1.2 christos DPRINTF("Before forking process PID=%d\n", getpid());
1125 1.2 christos SYSCALL_REQUIRE((child = fork()) != -1);
1126 1.1 kamil if (child == 0) {
1127 1.2 christos DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1128 1.1 kamil FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1129 1.1 kamil
1130 1.2 christos DPRINTF("Before raising %s from child\n", strsignal(sigval));
1131 1.1 kamil FORKEE_ASSERT(raise(sigval) == 0);
1132 1.1 kamil
1133 1.4 kamil printf("check_happy(%d)=%d\n", watchme, check_happy(watchme));
1134 1.1 kamil
1135 1.2 christos DPRINTF("Before raising %s from child\n", strsignal(sigval));
1136 1.1 kamil FORKEE_ASSERT(raise(sigval) == 0);
1137 1.1 kamil
1138 1.2 christos DPRINTF("Before exiting of the child process\n");
1139 1.1 kamil _exit(exitval);
1140 1.1 kamil }
1141 1.2 christos DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1142 1.1 kamil
1143 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1144 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1145 1.1 kamil
1146 1.1 kamil validate_status_stopped(status, sigval);
1147 1.1 kamil
1148 1.2 christos DPRINTF("Call GETDBREGS for the child process (r1)\n");
1149 1.2 christos SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1150 1.1 kamil
1151 1.2 christos DPRINTF("State of the debug registers (r1):\n");
1152 1.1 kamil for (i = 0; i < __arraycount(r1.dr); i++)
1153 1.2 christos DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1154 1.1 kamil
1155 1.1 kamil r1.dr[0] = (long)(intptr_t)check_happy;
1156 1.2 christos DPRINTF("Set DR0 (r1.dr[0]) to new value %" PRIxREGISTER "\n",
1157 1.1 kamil r1.dr[0]);
1158 1.1 kamil
1159 1.1 kamil r1.dr[7] = dr7.raw;
1160 1.2 christos DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1161 1.1 kamil r1.dr[7]);
1162 1.1 kamil
1163 1.2 christos DPRINTF("New state of the debug registers (r1):\n");
1164 1.1 kamil for (i = 0; i < __arraycount(r1.dr); i++)
1165 1.2 christos DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1166 1.1 kamil
1167 1.2 christos DPRINTF("Call SETDBREGS for the child process (r1)\n");
1168 1.2 christos SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1169 1.1 kamil
1170 1.2 christos DPRINTF("Call CONTINUE for the child process\n");
1171 1.2 christos SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1172 1.1 kamil
1173 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1174 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1175 1.1 kamil
1176 1.1 kamil validate_status_stopped(status, SIGTRAP);
1177 1.1 kamil
1178 1.2 christos DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
1179 1.2 christos SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
1180 1.1 kamil
1181 1.2 christos DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
1182 1.2 christos DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
1183 1.1 kamil info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
1184 1.1 kamil info.psi_siginfo.si_errno);
1185 1.1 kamil
1186 1.2 christos DPRINTF("Before checking siginfo_t\n");
1187 1.1 kamil ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, SIGTRAP);
1188 1.1 kamil ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_DBREG);
1189 1.1 kamil
1190 1.2 christos DPRINTF("Remove code trap from check_happy=%p\n", check_happy);
1191 1.1 kamil dr7.bits.global_dr0_breakpoint = 0;
1192 1.1 kamil r1.dr[7] = dr7.raw;
1193 1.2 christos DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1194 1.1 kamil r1.dr[7]);
1195 1.1 kamil
1196 1.2 christos DPRINTF("Call SETDBREGS for the child process (r1)\n");
1197 1.2 christos SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1198 1.1 kamil
1199 1.2 christos DPRINTF("Call CONTINUE for the child process\n");
1200 1.2 christos SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1201 1.1 kamil
1202 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1203 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1204 1.1 kamil
1205 1.1 kamil validate_status_stopped(status, sigval);
1206 1.1 kamil
1207 1.2 christos DPRINTF("Before resuming the child process where it left off and "
1208 1.1 kamil "without signal to be sent\n");
1209 1.2 christos SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1210 1.1 kamil
1211 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1212 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1213 1.1 kamil
1214 1.1 kamil validate_status_exited(status, exitval);
1215 1.1 kamil
1216 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1217 1.1 kamil TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1218 1.1 kamil }
1219 1.1 kamil #endif
1220 1.1 kamil
1221 1.1 kamil #if defined(HAVE_DBREGS)
1222 1.1 kamil ATF_TC(dbregs_dr1_trap_code);
1223 1.1 kamil ATF_TC_HEAD(dbregs_dr1_trap_code, tc)
1224 1.1 kamil {
1225 1.1 kamil atf_tc_set_md_var(tc, "descr",
1226 1.1 kamil "Verify that setting trap with DR1 triggers SIGTRAP "
1227 1.1 kamil "(break on code execution trap)");
1228 1.1 kamil }
1229 1.1 kamil
1230 1.1 kamil ATF_TC_BODY(dbregs_dr1_trap_code, tc)
1231 1.1 kamil {
1232 1.1 kamil const int exitval = 5;
1233 1.1 kamil const int sigval = SIGSTOP;
1234 1.1 kamil pid_t child, wpid;
1235 1.1 kamil #if defined(TWAIT_HAVE_STATUS)
1236 1.1 kamil int status;
1237 1.1 kamil #endif
1238 1.1 kamil struct dbreg r1;
1239 1.1 kamil size_t i;
1240 1.1 kamil volatile int watchme = 1;
1241 1.1 kamil union u dr7;
1242 1.1 kamil
1243 1.1 kamil struct ptrace_siginfo info;
1244 1.1 kamil memset(&info, 0, sizeof(info));
1245 1.1 kamil
1246 1.5 kamil if (!can_we_set_dbregs()) {
1247 1.5 kamil atf_tc_skip("Either run this test as root or set sysctl(3) "
1248 1.5 kamil "security.models.extensions.user_set_dbregs to 1");
1249 1.5 kamil }
1250 1.5 kamil
1251 1.1 kamil dr7.raw = 0;
1252 1.1 kamil dr7.bits.global_dr1_breakpoint = 1;
1253 1.1 kamil dr7.bits.condition_dr1 = 0; /* 0b00 -- break on code execution */
1254 1.1 kamil dr7.bits.len_dr1 = 0; /* 0b00 -- 1 byte */
1255 1.1 kamil
1256 1.2 christos DPRINTF("Before forking process PID=%d\n", getpid());
1257 1.2 christos SYSCALL_REQUIRE((child = fork()) != -1);
1258 1.1 kamil if (child == 0) {
1259 1.2 christos DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1260 1.1 kamil FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1261 1.1 kamil
1262 1.2 christos DPRINTF("Before raising %s from child\n", strsignal(sigval));
1263 1.1 kamil FORKEE_ASSERT(raise(sigval) == 0);
1264 1.1 kamil
1265 1.4 kamil printf("check_happy(%d)=%d\n", watchme, check_happy(watchme));
1266 1.1 kamil
1267 1.2 christos DPRINTF("Before raising %s from child\n", strsignal(sigval));
1268 1.1 kamil FORKEE_ASSERT(raise(sigval) == 0);
1269 1.1 kamil
1270 1.2 christos DPRINTF("Before exiting of the child process\n");
1271 1.1 kamil _exit(exitval);
1272 1.1 kamil }
1273 1.2 christos DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1274 1.1 kamil
1275 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1276 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1277 1.1 kamil
1278 1.1 kamil validate_status_stopped(status, sigval);
1279 1.1 kamil
1280 1.2 christos DPRINTF("Call GETDBREGS for the child process (r1)\n");
1281 1.2 christos SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1282 1.1 kamil
1283 1.2 christos DPRINTF("State of the debug registers (r1):\n");
1284 1.1 kamil for (i = 0; i < __arraycount(r1.dr); i++)
1285 1.2 christos DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1286 1.1 kamil
1287 1.1 kamil r1.dr[1] = (long)(intptr_t)check_happy;
1288 1.2 christos DPRINTF("Set DR1 (r1.dr[1]) to new value %" PRIxREGISTER "\n",
1289 1.1 kamil r1.dr[1]);
1290 1.1 kamil
1291 1.1 kamil r1.dr[7] = dr7.raw;
1292 1.2 christos DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1293 1.1 kamil r1.dr[7]);
1294 1.1 kamil
1295 1.2 christos DPRINTF("New state of the debug registers (r1):\n");
1296 1.1 kamil for (i = 0; i < __arraycount(r1.dr); i++)
1297 1.2 christos DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1298 1.1 kamil
1299 1.2 christos DPRINTF("Call SETDBREGS for the child process (r1)\n");
1300 1.2 christos SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1301 1.1 kamil
1302 1.2 christos DPRINTF("Call CONTINUE for the child process\n");
1303 1.2 christos SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1304 1.1 kamil
1305 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1306 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1307 1.1 kamil
1308 1.1 kamil validate_status_stopped(status, SIGTRAP);
1309 1.1 kamil
1310 1.2 christos DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
1311 1.2 christos SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
1312 1.1 kamil
1313 1.2 christos DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
1314 1.2 christos DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
1315 1.1 kamil info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
1316 1.1 kamil info.psi_siginfo.si_errno);
1317 1.1 kamil
1318 1.2 christos DPRINTF("Before checking siginfo_t\n");
1319 1.1 kamil ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, SIGTRAP);
1320 1.1 kamil ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_DBREG);
1321 1.1 kamil
1322 1.2 christos DPRINTF("Remove code trap from check_happy=%p\n", check_happy);
1323 1.1 kamil dr7.bits.global_dr1_breakpoint = 0;
1324 1.1 kamil r1.dr[7] = dr7.raw;
1325 1.2 christos DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1326 1.1 kamil r1.dr[7]);
1327 1.1 kamil
1328 1.2 christos DPRINTF("Call SETDBREGS for the child process (r1)\n");
1329 1.2 christos SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1330 1.1 kamil
1331 1.2 christos DPRINTF("Call CONTINUE for the child process\n");
1332 1.2 christos SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1333 1.1 kamil
1334 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1335 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1336 1.1 kamil
1337 1.1 kamil validate_status_stopped(status, sigval);
1338 1.1 kamil
1339 1.2 christos DPRINTF("Before resuming the child process where it left off and "
1340 1.1 kamil "without signal to be sent\n");
1341 1.2 christos SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1342 1.1 kamil
1343 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1344 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1345 1.1 kamil
1346 1.1 kamil validate_status_exited(status, exitval);
1347 1.1 kamil
1348 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1349 1.1 kamil TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1350 1.1 kamil }
1351 1.1 kamil #endif
1352 1.1 kamil
1353 1.1 kamil #if defined(HAVE_DBREGS)
1354 1.1 kamil ATF_TC(dbregs_dr2_trap_code);
1355 1.1 kamil ATF_TC_HEAD(dbregs_dr2_trap_code, tc)
1356 1.1 kamil {
1357 1.1 kamil atf_tc_set_md_var(tc, "descr",
1358 1.1 kamil "Verify that setting trap with DR2 triggers SIGTRAP "
1359 1.1 kamil "(break on code execution trap)");
1360 1.1 kamil }
1361 1.1 kamil
1362 1.1 kamil ATF_TC_BODY(dbregs_dr2_trap_code, tc)
1363 1.1 kamil {
1364 1.1 kamil const int exitval = 5;
1365 1.1 kamil const int sigval = SIGSTOP;
1366 1.1 kamil pid_t child, wpid;
1367 1.1 kamil #if defined(TWAIT_HAVE_STATUS)
1368 1.1 kamil int status;
1369 1.1 kamil #endif
1370 1.1 kamil struct dbreg r1;
1371 1.1 kamil size_t i;
1372 1.1 kamil volatile int watchme = 1;
1373 1.1 kamil union u dr7;
1374 1.1 kamil
1375 1.1 kamil struct ptrace_siginfo info;
1376 1.1 kamil memset(&info, 0, sizeof(info));
1377 1.1 kamil
1378 1.5 kamil if (!can_we_set_dbregs()) {
1379 1.5 kamil atf_tc_skip("Either run this test as root or set sysctl(3) "
1380 1.5 kamil "security.models.extensions.user_set_dbregs to 1");
1381 1.5 kamil }
1382 1.5 kamil
1383 1.1 kamil dr7.raw = 0;
1384 1.1 kamil dr7.bits.global_dr2_breakpoint = 1;
1385 1.1 kamil dr7.bits.condition_dr2 = 0; /* 0b00 -- break on code execution */
1386 1.1 kamil dr7.bits.len_dr2 = 0; /* 0b00 -- 1 byte */
1387 1.1 kamil
1388 1.2 christos DPRINTF("Before forking process PID=%d\n", getpid());
1389 1.2 christos SYSCALL_REQUIRE((child = fork()) != -1);
1390 1.1 kamil if (child == 0) {
1391 1.2 christos DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1392 1.1 kamil FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1393 1.1 kamil
1394 1.2 christos DPRINTF("Before raising %s from child\n", strsignal(sigval));
1395 1.1 kamil FORKEE_ASSERT(raise(sigval) == 0);
1396 1.1 kamil
1397 1.4 kamil printf("check_happy(%d)=%d\n", watchme, check_happy(watchme));
1398 1.1 kamil
1399 1.2 christos DPRINTF("Before raising %s from child\n", strsignal(sigval));
1400 1.1 kamil FORKEE_ASSERT(raise(sigval) == 0);
1401 1.1 kamil
1402 1.2 christos DPRINTF("Before exiting of the child process\n");
1403 1.1 kamil _exit(exitval);
1404 1.1 kamil }
1405 1.2 christos DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1406 1.1 kamil
1407 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1408 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1409 1.1 kamil
1410 1.1 kamil validate_status_stopped(status, sigval);
1411 1.1 kamil
1412 1.2 christos DPRINTF("Call GETDBREGS for the child process (r1)\n");
1413 1.2 christos SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1414 1.1 kamil
1415 1.2 christos DPRINTF("State of the debug registers (r1):\n");
1416 1.1 kamil for (i = 0; i < __arraycount(r1.dr); i++)
1417 1.2 christos DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1418 1.1 kamil
1419 1.1 kamil r1.dr[2] = (long)(intptr_t)check_happy;
1420 1.2 christos DPRINTF("Set DR2 (r1.dr[2]) to new value %" PRIxREGISTER "\n",
1421 1.1 kamil r1.dr[2]);
1422 1.1 kamil
1423 1.1 kamil r1.dr[7] = dr7.raw;
1424 1.2 christos DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1425 1.1 kamil r1.dr[7]);
1426 1.1 kamil
1427 1.2 christos DPRINTF("New state of the debug registers (r1):\n");
1428 1.1 kamil for (i = 0; i < __arraycount(r1.dr); i++)
1429 1.2 christos DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1430 1.1 kamil
1431 1.2 christos DPRINTF("Call SETDBREGS for the child process (r1)\n");
1432 1.2 christos SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1433 1.1 kamil
1434 1.2 christos DPRINTF("Call CONTINUE for the child process\n");
1435 1.2 christos SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1436 1.1 kamil
1437 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1438 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1439 1.1 kamil
1440 1.1 kamil validate_status_stopped(status, SIGTRAP);
1441 1.1 kamil
1442 1.2 christos DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
1443 1.2 christos SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
1444 1.1 kamil
1445 1.2 christos DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
1446 1.2 christos DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
1447 1.1 kamil info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
1448 1.1 kamil info.psi_siginfo.si_errno);
1449 1.1 kamil
1450 1.2 christos DPRINTF("Before checking siginfo_t\n");
1451 1.1 kamil ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, SIGTRAP);
1452 1.1 kamil ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_DBREG);
1453 1.1 kamil
1454 1.2 christos DPRINTF("Remove code trap from check_happy=%p\n", check_happy);
1455 1.1 kamil dr7.bits.global_dr2_breakpoint = 0;
1456 1.1 kamil r1.dr[7] = dr7.raw;
1457 1.2 christos DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1458 1.1 kamil r1.dr[7]);
1459 1.1 kamil
1460 1.2 christos DPRINTF("Call SETDBREGS for the child process (r1)\n");
1461 1.2 christos SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1462 1.1 kamil
1463 1.2 christos DPRINTF("Call CONTINUE for the child process\n");
1464 1.2 christos SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1465 1.1 kamil
1466 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1467 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1468 1.1 kamil
1469 1.1 kamil validate_status_stopped(status, sigval);
1470 1.1 kamil
1471 1.2 christos DPRINTF("Before resuming the child process where it left off and "
1472 1.1 kamil "without signal to be sent\n");
1473 1.2 christos SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1474 1.1 kamil
1475 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1476 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1477 1.1 kamil
1478 1.1 kamil validate_status_exited(status, exitval);
1479 1.1 kamil
1480 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1481 1.1 kamil TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1482 1.1 kamil }
1483 1.1 kamil #endif
1484 1.1 kamil
1485 1.1 kamil #if defined(HAVE_DBREGS)
1486 1.1 kamil ATF_TC(dbregs_dr3_trap_code);
1487 1.1 kamil ATF_TC_HEAD(dbregs_dr3_trap_code, tc)
1488 1.1 kamil {
1489 1.1 kamil atf_tc_set_md_var(tc, "descr",
1490 1.1 kamil "Verify that setting trap with DR3 triggers SIGTRAP "
1491 1.1 kamil "(break on code execution trap)");
1492 1.1 kamil }
1493 1.1 kamil
1494 1.1 kamil ATF_TC_BODY(dbregs_dr3_trap_code, tc)
1495 1.1 kamil {
1496 1.1 kamil const int exitval = 5;
1497 1.1 kamil const int sigval = SIGSTOP;
1498 1.1 kamil pid_t child, wpid;
1499 1.1 kamil #if defined(TWAIT_HAVE_STATUS)
1500 1.1 kamil int status;
1501 1.1 kamil #endif
1502 1.1 kamil struct dbreg r1;
1503 1.1 kamil size_t i;
1504 1.1 kamil volatile int watchme = 1;
1505 1.1 kamil union u dr7;
1506 1.1 kamil
1507 1.1 kamil struct ptrace_siginfo info;
1508 1.1 kamil memset(&info, 0, sizeof(info));
1509 1.1 kamil
1510 1.5 kamil if (!can_we_set_dbregs()) {
1511 1.5 kamil atf_tc_skip("Either run this test as root or set sysctl(3) "
1512 1.5 kamil "security.models.extensions.user_set_dbregs to 1");
1513 1.5 kamil }
1514 1.5 kamil
1515 1.1 kamil dr7.raw = 0;
1516 1.1 kamil dr7.bits.global_dr3_breakpoint = 1;
1517 1.1 kamil dr7.bits.condition_dr3 = 0; /* 0b00 -- break on code execution */
1518 1.1 kamil dr7.bits.len_dr3 = 0; /* 0b00 -- 1 byte */
1519 1.1 kamil
1520 1.2 christos DPRINTF("Before forking process PID=%d\n", getpid());
1521 1.2 christos SYSCALL_REQUIRE((child = fork()) != -1);
1522 1.1 kamil if (child == 0) {
1523 1.2 christos DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1524 1.1 kamil FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1525 1.1 kamil
1526 1.2 christos DPRINTF("Before raising %s from child\n", strsignal(sigval));
1527 1.1 kamil FORKEE_ASSERT(raise(sigval) == 0);
1528 1.1 kamil
1529 1.4 kamil printf("check_happy(%d)=%d\n", watchme, check_happy(watchme));
1530 1.1 kamil
1531 1.2 christos DPRINTF("Before raising %s from child\n", strsignal(sigval));
1532 1.1 kamil FORKEE_ASSERT(raise(sigval) == 0);
1533 1.1 kamil
1534 1.2 christos DPRINTF("Before exiting of the child process\n");
1535 1.1 kamil _exit(exitval);
1536 1.1 kamil }
1537 1.2 christos DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1538 1.1 kamil
1539 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1540 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1541 1.1 kamil
1542 1.1 kamil validate_status_stopped(status, sigval);
1543 1.1 kamil
1544 1.2 christos DPRINTF("Call GETDBREGS for the child process (r1)\n");
1545 1.2 christos SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1546 1.1 kamil
1547 1.2 christos DPRINTF("State of the debug registers (r1):\n");
1548 1.1 kamil for (i = 0; i < __arraycount(r1.dr); i++)
1549 1.2 christos DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1550 1.1 kamil
1551 1.1 kamil r1.dr[3] = (long)(intptr_t)check_happy;
1552 1.2 christos DPRINTF("Set DR3 (r1.dr[3]) to new value %" PRIxREGISTER "\n",
1553 1.1 kamil r1.dr[3]);
1554 1.1 kamil
1555 1.1 kamil r1.dr[7] = dr7.raw;
1556 1.2 christos DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1557 1.1 kamil r1.dr[7]);
1558 1.1 kamil
1559 1.2 christos DPRINTF("New state of the debug registers (r1):\n");
1560 1.1 kamil for (i = 0; i < __arraycount(r1.dr); i++)
1561 1.2 christos DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1562 1.1 kamil
1563 1.2 christos DPRINTF("Call SETDBREGS for the child process (r1)\n");
1564 1.2 christos SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1565 1.1 kamil
1566 1.2 christos DPRINTF("Call CONTINUE for the child process\n");
1567 1.2 christos SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1568 1.1 kamil
1569 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1570 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1571 1.1 kamil
1572 1.1 kamil validate_status_stopped(status, SIGTRAP);
1573 1.1 kamil
1574 1.2 christos DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
1575 1.2 christos SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
1576 1.1 kamil
1577 1.2 christos DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
1578 1.2 christos DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
1579 1.1 kamil info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
1580 1.1 kamil info.psi_siginfo.si_errno);
1581 1.1 kamil
1582 1.2 christos DPRINTF("Before checking siginfo_t\n");
1583 1.1 kamil ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, SIGTRAP);
1584 1.1 kamil ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_DBREG);
1585 1.1 kamil
1586 1.2 christos DPRINTF("Remove code trap from check_happy=%p\n", check_happy);
1587 1.1 kamil dr7.bits.global_dr3_breakpoint = 0;
1588 1.1 kamil r1.dr[7] = dr7.raw;
1589 1.2 christos DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1590 1.1 kamil r1.dr[7]);
1591 1.1 kamil
1592 1.2 christos DPRINTF("Call SETDBREGS for the child process (r1)\n");
1593 1.2 christos SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1594 1.1 kamil
1595 1.2 christos DPRINTF("Call CONTINUE for the child process\n");
1596 1.2 christos SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1597 1.1 kamil
1598 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1599 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1600 1.1 kamil
1601 1.1 kamil validate_status_stopped(status, sigval);
1602 1.1 kamil
1603 1.2 christos DPRINTF("Before resuming the child process where it left off and "
1604 1.1 kamil "without signal to be sent\n");
1605 1.2 christos SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1606 1.1 kamil
1607 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1608 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1609 1.1 kamil
1610 1.1 kamil validate_status_exited(status, exitval);
1611 1.1 kamil
1612 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1613 1.1 kamil TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1614 1.1 kamil }
1615 1.1 kamil #endif
1616 1.1 kamil
1617 1.1 kamil volatile lwpid_t x86_the_lwp_id = 0;
1618 1.1 kamil
1619 1.1 kamil static void __used
1620 1.1 kamil x86_lwp_main_func(void *arg)
1621 1.1 kamil {
1622 1.1 kamil x86_the_lwp_id = _lwp_self();
1623 1.1 kamil _lwp_exit();
1624 1.1 kamil }
1625 1.1 kamil
1626 1.1 kamil static void
1627 1.1 kamil dbregs_dont_inherit_lwp(int reg)
1628 1.1 kamil {
1629 1.1 kamil const int exitval = 5;
1630 1.1 kamil const int sigval = SIGSTOP;
1631 1.1 kamil pid_t child, wpid;
1632 1.1 kamil #if defined(TWAIT_HAVE_STATUS)
1633 1.1 kamil int status;
1634 1.1 kamil #endif
1635 1.1 kamil ptrace_state_t state;
1636 1.1 kamil const int slen = sizeof(state);
1637 1.1 kamil ptrace_event_t event;
1638 1.1 kamil const int elen = sizeof(event);
1639 1.1 kamil ucontext_t uc;
1640 1.1 kamil lwpid_t lid;
1641 1.1 kamil static const size_t ssize = 16*1024;
1642 1.1 kamil void *stack;
1643 1.1 kamil size_t i;
1644 1.1 kamil struct dbreg r1;
1645 1.1 kamil struct dbreg r2;
1646 1.1 kamil
1647 1.5 kamil if (!can_we_set_dbregs()) {
1648 1.5 kamil atf_tc_skip("Either run this test as root or set sysctl(3) "
1649 1.5 kamil "security.models.extensions.user_set_dbregs to 1");
1650 1.5 kamil }
1651 1.5 kamil
1652 1.2 christos DPRINTF("Before forking process PID=%d\n", getpid());
1653 1.2 christos SYSCALL_REQUIRE((child = fork()) != -1);
1654 1.1 kamil if (child == 0) {
1655 1.2 christos DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1656 1.1 kamil FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1657 1.1 kamil
1658 1.2 christos DPRINTF("Before raising %s from child\n", strsignal(sigval));
1659 1.1 kamil FORKEE_ASSERT(raise(sigval) == 0);
1660 1.1 kamil
1661 1.2 christos DPRINTF("Before allocating memory for stack in child\n");
1662 1.1 kamil FORKEE_ASSERT((stack = malloc(ssize)) != NULL);
1663 1.1 kamil
1664 1.2 christos DPRINTF("Before making context for new lwp in child\n");
1665 1.1 kamil _lwp_makecontext(&uc, x86_lwp_main_func, NULL, NULL, stack,
1666 1.1 kamil ssize);
1667 1.1 kamil
1668 1.2 christos DPRINTF("Before creating new in child\n");
1669 1.1 kamil FORKEE_ASSERT(_lwp_create(&uc, 0, &lid) == 0);
1670 1.1 kamil
1671 1.2 christos DPRINTF("Before waiting for lwp %d to exit\n", lid);
1672 1.1 kamil FORKEE_ASSERT(_lwp_wait(lid, NULL) == 0);
1673 1.1 kamil
1674 1.2 christos DPRINTF("Before verifying that reported %d and running lid %d "
1675 1.1 kamil "are the same\n", lid, x86_the_lwp_id);
1676 1.1 kamil FORKEE_ASSERT_EQ(lid, x86_the_lwp_id);
1677 1.1 kamil
1678 1.2 christos DPRINTF("Before exiting of the child process\n");
1679 1.1 kamil _exit(exitval);
1680 1.1 kamil }
1681 1.2 christos DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1682 1.1 kamil
1683 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1684 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1685 1.1 kamil
1686 1.1 kamil validate_status_stopped(status, sigval);
1687 1.1 kamil
1688 1.2 christos DPRINTF("Set empty EVENT_MASK for the child %d\n", child);
1689 1.1 kamil event.pe_set_event = PTRACE_LWP_CREATE;
1690 1.2 christos SYSCALL_REQUIRE(ptrace(PT_SET_EVENT_MASK, child, &event, elen) != -1);
1691 1.1 kamil
1692 1.2 christos DPRINTF("Call GETDBREGS for the child process (r1)\n");
1693 1.2 christos SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1694 1.1 kamil
1695 1.2 christos DPRINTF("State of the debug registers (r1):\n");
1696 1.1 kamil for (i = 0; i < __arraycount(r1.dr); i++)
1697 1.2 christos DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1698 1.1 kamil
1699 1.1 kamil r1.dr[reg] = (long)(intptr_t)check_happy;
1700 1.2 christos DPRINTF("Set DR%d (r1.dr[%d]) to new value %" PRIxREGISTER "\n",
1701 1.1 kamil reg, reg, r1.dr[0]);
1702 1.1 kamil
1703 1.2 christos DPRINTF("New state of the debug registers (r1):\n");
1704 1.1 kamil for (i = 0; i < __arraycount(r1.dr); i++)
1705 1.2 christos DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1706 1.1 kamil
1707 1.2 christos DPRINTF("Call SETDBREGS for the child process (r1)\n");
1708 1.2 christos SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1709 1.1 kamil
1710 1.2 christos DPRINTF("Before resuming the child process where it left off and "
1711 1.1 kamil "without signal to be sent\n");
1712 1.2 christos SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1713 1.1 kamil
1714 1.2 christos DPRINTF("Before calling %s() for the child - expected stopped "
1715 1.1 kamil "SIGTRAP\n", TWAIT_FNAME);
1716 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1717 1.1 kamil
1718 1.1 kamil validate_status_stopped(status, SIGTRAP);
1719 1.1 kamil
1720 1.2 christos SYSCALL_REQUIRE(ptrace(PT_GET_PROCESS_STATE, child, &state, slen) != -1);
1721 1.1 kamil
1722 1.1 kamil ATF_REQUIRE_EQ(state.pe_report_event, PTRACE_LWP_CREATE);
1723 1.1 kamil
1724 1.1 kamil lid = state.pe_lwp;
1725 1.2 christos DPRINTF("Reported PTRACE_LWP_CREATE event with lid %d\n", lid);
1726 1.1 kamil
1727 1.2 christos DPRINTF("Call GETDBREGS for the child process new lwp (r2)\n");
1728 1.2 christos SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r2, lid) != -1);
1729 1.1 kamil
1730 1.2 christos DPRINTF("State of the debug registers (r2):\n");
1731 1.1 kamil for (i = 0; i < __arraycount(r2.dr); i++)
1732 1.2 christos DPRINTF("r2[%zu]=%" PRIxREGISTER "\n", i, r2.dr[i]);
1733 1.1 kamil
1734 1.2 christos DPRINTF("Assert that (r1) and (r2) are not the same\n");
1735 1.1 kamil ATF_REQUIRE(memcmp(&r1, &r2, sizeof(r1)) != 0);
1736 1.1 kamil
1737 1.2 christos DPRINTF("Before resuming the child process where it left off and "
1738 1.1 kamil "without signal to be sent\n");
1739 1.2 christos SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1740 1.1 kamil
1741 1.2 christos DPRINTF("Before calling %s() for the child - expected exited\n",
1742 1.1 kamil TWAIT_FNAME);
1743 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1744 1.1 kamil
1745 1.1 kamil validate_status_exited(status, exitval);
1746 1.1 kamil
1747 1.2 christos DPRINTF("Before calling %s() for the child - expected no process\n",
1748 1.1 kamil TWAIT_FNAME);
1749 1.1 kamil TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1750 1.1 kamil }
1751 1.1 kamil
1752 1.1 kamil ATF_TC(dbregs_dr0_dont_inherit_lwp);
1753 1.1 kamil ATF_TC_HEAD(dbregs_dr0_dont_inherit_lwp, tc)
1754 1.1 kamil {
1755 1.1 kamil atf_tc_set_md_var(tc, "descr",
1756 1.1 kamil "Verify that 1 LWP creation is intercepted by ptrace(2) with "
1757 1.1 kamil "EVENT_MASK set to PTRACE_LWP_CREATE and Debug Register 0 from "
1758 1.1 kamil "the forker thread is not inherited");
1759 1.1 kamil }
1760 1.1 kamil
1761 1.1 kamil ATF_TC_BODY(dbregs_dr0_dont_inherit_lwp, tc)
1762 1.1 kamil {
1763 1.1 kamil dbregs_dont_inherit_lwp(0);
1764 1.1 kamil }
1765 1.1 kamil
1766 1.1 kamil ATF_TC(dbregs_dr1_dont_inherit_lwp);
1767 1.1 kamil ATF_TC_HEAD(dbregs_dr1_dont_inherit_lwp, tc)
1768 1.1 kamil {
1769 1.1 kamil atf_tc_set_md_var(tc, "descr",
1770 1.1 kamil "Verify that 1 LWP creation is intercepted by ptrace(2) with "
1771 1.1 kamil "EVENT_MASK set to PTRACE_LWP_CREATE and Debug Register 1 from "
1772 1.1 kamil "the forker thread is not inherited");
1773 1.1 kamil }
1774 1.1 kamil
1775 1.1 kamil ATF_TC_BODY(dbregs_dr1_dont_inherit_lwp, tc)
1776 1.1 kamil {
1777 1.1 kamil dbregs_dont_inherit_lwp(1);
1778 1.1 kamil }
1779 1.1 kamil
1780 1.1 kamil ATF_TC(dbregs_dr2_dont_inherit_lwp);
1781 1.1 kamil ATF_TC_HEAD(dbregs_dr2_dont_inherit_lwp, tc)
1782 1.1 kamil {
1783 1.1 kamil atf_tc_set_md_var(tc, "descr",
1784 1.1 kamil "Verify that 1 LWP creation is intercepted by ptrace(2) with "
1785 1.1 kamil "EVENT_MASK set to PTRACE_LWP_CREATE and Debug Register 2 from "
1786 1.1 kamil "the forker thread is not inherited");
1787 1.1 kamil }
1788 1.1 kamil
1789 1.1 kamil ATF_TC_BODY(dbregs_dr2_dont_inherit_lwp, tc)
1790 1.1 kamil {
1791 1.1 kamil dbregs_dont_inherit_lwp(2);
1792 1.1 kamil }
1793 1.1 kamil
1794 1.1 kamil ATF_TC(dbregs_dr3_dont_inherit_lwp);
1795 1.1 kamil ATF_TC_HEAD(dbregs_dr3_dont_inherit_lwp, tc)
1796 1.1 kamil {
1797 1.1 kamil atf_tc_set_md_var(tc, "descr",
1798 1.1 kamil "Verify that 1 LWP creation is intercepted by ptrace(2) with "
1799 1.1 kamil "EVENT_MASK set to PTRACE_LWP_CREATE and Debug Register 3 from "
1800 1.1 kamil "the forker thread is not inherited");
1801 1.1 kamil }
1802 1.1 kamil
1803 1.1 kamil ATF_TC_BODY(dbregs_dr3_dont_inherit_lwp, tc)
1804 1.1 kamil {
1805 1.1 kamil dbregs_dont_inherit_lwp(3);
1806 1.1 kamil }
1807 1.1 kamil
1808 1.1 kamil static void
1809 1.1 kamil dbregs_dont_inherit_execve(int reg)
1810 1.1 kamil {
1811 1.1 kamil const int sigval = SIGTRAP;
1812 1.1 kamil pid_t child, wpid;
1813 1.1 kamil #if defined(TWAIT_HAVE_STATUS)
1814 1.1 kamil int status;
1815 1.1 kamil #endif
1816 1.1 kamil size_t i;
1817 1.1 kamil struct dbreg r1;
1818 1.1 kamil struct dbreg r2;
1819 1.1 kamil
1820 1.1 kamil struct ptrace_siginfo info;
1821 1.1 kamil memset(&info, 0, sizeof(info));
1822 1.1 kamil
1823 1.5 kamil if (!can_we_set_dbregs()) {
1824 1.5 kamil atf_tc_skip("Either run this test as root or set sysctl(3) "
1825 1.5 kamil "security.models.extensions.user_set_dbregs to 1");
1826 1.5 kamil }
1827 1.5 kamil
1828 1.2 christos DPRINTF("Before forking process PID=%d\n", getpid());
1829 1.2 christos SYSCALL_REQUIRE((child = fork()) != -1);
1830 1.1 kamil if (child == 0) {
1831 1.2 christos DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1832 1.1 kamil FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1833 1.1 kamil
1834 1.2 christos DPRINTF("Before raising %s from child\n", strsignal(sigval));
1835 1.1 kamil FORKEE_ASSERT(raise(sigval) == 0);
1836 1.1 kamil
1837 1.2 christos DPRINTF("Before calling execve(2) from child\n");
1838 1.1 kamil execlp("/bin/echo", "/bin/echo", NULL);
1839 1.1 kamil
1840 1.1 kamil FORKEE_ASSERT(0 && "Not reached");
1841 1.1 kamil }
1842 1.2 christos DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1843 1.1 kamil
1844 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1845 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1846 1.1 kamil
1847 1.1 kamil validate_status_stopped(status, sigval);
1848 1.1 kamil
1849 1.2 christos DPRINTF("Call GETDBREGS for the child process (r1)\n");
1850 1.2 christos SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1851 1.1 kamil
1852 1.2 christos DPRINTF("State of the debug registers (r1):\n");
1853 1.1 kamil for (i = 0; i < __arraycount(r1.dr); i++)
1854 1.2 christos DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1855 1.1 kamil
1856 1.1 kamil r1.dr[reg] = (long)(intptr_t)check_happy;
1857 1.2 christos DPRINTF("Set DR%d (r1.dr[%d]) to new value %" PRIxREGISTER "\n",
1858 1.1 kamil reg, reg, r1.dr[reg]);
1859 1.1 kamil
1860 1.2 christos DPRINTF("New state of the debug registers (r1):\n");
1861 1.1 kamil for (i = 0; i < __arraycount(r1.dr); i++)
1862 1.2 christos DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1863 1.1 kamil
1864 1.2 christos DPRINTF("Call SETDBREGS for the child process (r1)\n");
1865 1.2 christos SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1866 1.1 kamil
1867 1.2 christos DPRINTF("Before resuming the child process where it left off and "
1868 1.1 kamil "without signal to be sent\n");
1869 1.2 christos SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1870 1.1 kamil
1871 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1872 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1873 1.1 kamil
1874 1.1 kamil validate_status_stopped(status, sigval);
1875 1.1 kamil
1876 1.2 christos DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
1877 1.2 christos SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
1878 1.1 kamil
1879 1.2 christos DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
1880 1.2 christos DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
1881 1.1 kamil info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
1882 1.1 kamil info.psi_siginfo.si_errno);
1883 1.1 kamil
1884 1.1 kamil ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, sigval);
1885 1.1 kamil ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_EXEC);
1886 1.1 kamil
1887 1.2 christos DPRINTF("Call GETDBREGS for the child process after execve(2)\n");
1888 1.2 christos SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r2, 0) != -1);
1889 1.1 kamil
1890 1.2 christos DPRINTF("State of the debug registers (r2):\n");
1891 1.1 kamil for (i = 0; i < __arraycount(r2.dr); i++)
1892 1.2 christos DPRINTF("r2[%zu]=%" PRIxREGISTER "\n", i, r2.dr[i]);
1893 1.1 kamil
1894 1.2 christos DPRINTF("Assert that (r1) and (r2) are not the same\n");
1895 1.1 kamil ATF_REQUIRE(memcmp(&r1, &r2, sizeof(r1)) != 0);
1896 1.1 kamil
1897 1.2 christos DPRINTF("Before resuming the child process where it left off and "
1898 1.1 kamil "without signal to be sent\n");
1899 1.2 christos SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1900 1.1 kamil
1901 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1902 1.1 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1903 1.1 kamil
1904 1.2 christos DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1905 1.1 kamil TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1906 1.1 kamil }
1907 1.1 kamil
1908 1.1 kamil ATF_TC(dbregs_dr0_dont_inherit_execve);
1909 1.1 kamil ATF_TC_HEAD(dbregs_dr0_dont_inherit_execve, tc)
1910 1.1 kamil {
1911 1.1 kamil atf_tc_set_md_var(tc, "descr",
1912 1.1 kamil "Verify that execve(2) is intercepted by tracer and Debug "
1913 1.1 kamil "Register 0 is reset");
1914 1.1 kamil }
1915 1.1 kamil
1916 1.1 kamil ATF_TC_BODY(dbregs_dr0_dont_inherit_execve, tc)
1917 1.1 kamil {
1918 1.1 kamil dbregs_dont_inherit_execve(0);
1919 1.1 kamil }
1920 1.1 kamil
1921 1.1 kamil ATF_TC(dbregs_dr1_dont_inherit_execve);
1922 1.1 kamil ATF_TC_HEAD(dbregs_dr1_dont_inherit_execve, tc)
1923 1.1 kamil {
1924 1.1 kamil atf_tc_set_md_var(tc, "descr",
1925 1.1 kamil "Verify that execve(2) is intercepted by tracer and Debug "
1926 1.1 kamil "Register 1 is reset");
1927 1.1 kamil }
1928 1.1 kamil
1929 1.1 kamil ATF_TC_BODY(dbregs_dr1_dont_inherit_execve, tc)
1930 1.1 kamil {
1931 1.1 kamil dbregs_dont_inherit_execve(1);
1932 1.1 kamil }
1933 1.1 kamil
1934 1.1 kamil ATF_TC(dbregs_dr2_dont_inherit_execve);
1935 1.1 kamil ATF_TC_HEAD(dbregs_dr2_dont_inherit_execve, tc)
1936 1.1 kamil {
1937 1.1 kamil atf_tc_set_md_var(tc, "descr",
1938 1.1 kamil "Verify that execve(2) is intercepted by tracer and Debug "
1939 1.1 kamil "Register 2 is reset");
1940 1.1 kamil }
1941 1.1 kamil
1942 1.1 kamil ATF_TC_BODY(dbregs_dr2_dont_inherit_execve, tc)
1943 1.1 kamil {
1944 1.1 kamil dbregs_dont_inherit_execve(2);
1945 1.1 kamil }
1946 1.1 kamil
1947 1.1 kamil ATF_TC(dbregs_dr3_dont_inherit_execve);
1948 1.1 kamil ATF_TC_HEAD(dbregs_dr3_dont_inherit_execve, tc)
1949 1.1 kamil {
1950 1.1 kamil atf_tc_set_md_var(tc, "descr",
1951 1.1 kamil "Verify that execve(2) is intercepted by tracer and Debug "
1952 1.1 kamil "Register 3 is reset");
1953 1.1 kamil }
1954 1.1 kamil
1955 1.1 kamil ATF_TC_BODY(dbregs_dr3_dont_inherit_execve, tc)
1956 1.1 kamil {
1957 1.1 kamil dbregs_dont_inherit_execve(3);
1958 1.1 kamil }
1959 1.7 kamil
1960 1.7 kamil /// ----------------------------------------------------------------------------
1961 1.7 kamil
1962 1.7 kamil ATF_TC(x86_cve_2018_8897);
1963 1.7 kamil ATF_TC_HEAD(x86_cve_2018_8897, tc)
1964 1.7 kamil {
1965 1.7 kamil atf_tc_set_md_var(tc, "descr",
1966 1.7 kamil "Verify mitigation for CVE-2018-8897 (POP SS debug exception)");
1967 1.7 kamil }
1968 1.7 kamil
1969 1.7 kamil #define X86_CVE_2018_8897_PAGE 0x5000 /* page addressable by 32-bit registers */
1970 1.7 kamil
1971 1.7 kamil static void
1972 1.7 kamil x86_cve_2018_8897_trigger(void)
1973 1.7 kamil {
1974 1.7 kamil /*
1975 1.7 kamil * A function to trigger the POP SS (CVE-2018-8897) vulnerability
1976 1.7 kamil *
1977 1.7 kamil * ifdef __x86_64__
1978 1.7 kamil *
1979 1.7 kamil * We need to switch to 32-bit mode execution on 64-bit kernel.
1980 1.7 kamil * This is achieved with far jump instruction and GDT descriptor
1981 1.7 kamil * set to 32-bit CS selector. The 32-bit CS selector is kernel
1982 1.7 kamil * specific, in the NetBSD case registered as GUCODE32_SEL
1983 1.7 kamil * that is equal to (14 (decimal) << 3) with GDT and user
1984 1.7 kamil * privilege level (this makes it 0x73).
1985 1.7 kamil *
1986 1.7 kamil * In UNIX as(1) assembly x86_64 far jump is coded as ljmp.
1987 1.7 kamil * amd64 ljmp requires an indirect address with cs:RIP.
1988 1.7 kamil *
1989 1.7 kamil * When we are running in 32-bit mode, it's similar to the
1990 1.7 kamil * mode as if the binary had been launched in netbsd32.
1991 1.7 kamil *
1992 1.7 kamil * There are two versions of this exploit, one with RIP
1993 1.7 kamil * relative code and the other with static addresses.
1994 1.7 kamil * The first one is PIE code aware, the other no-PIE one.
1995 1.7 kamil *
1996 1.7 kamil *
1997 1.7 kamil * After switching to the 32-bit mode we can move on to the remaining
1998 1.7 kamil * part of the exploit.
1999 1.7 kamil *
2000 1.7 kamil * endif // __x86_64__
2001 1.7 kamil *
2002 1.7 kamil * Set the stack pointer to the page we allocated earlier. Remember
2003 1.7 kamil * that we put an SS selector exactly at this address, so we can pop.
2004 1.7 kamil *
2005 1.7 kamil * movl $0x5000,%esp
2006 1.7 kamil *
2007 1.7 kamil * Pop the SS selector off the stack. This reloads the SS selector,
2008 1.7 kamil * which is fine. Remember that we set DR0 at address 0x5000, which
2009 1.7 kamil * we are now reading. Therefore, on this instruction, the CPU will
2010 1.7 kamil * raise a #DB exception.
2011 1.7 kamil *
2012 1.7 kamil * But the "pop %ss" instruction is special: it blocks exceptions
2013 1.7 kamil * until the next instruction is executed. So the #DB that we just
2014 1.7 kamil * raised is actually blocked.
2015 1.7 kamil *
2016 1.7 kamil * pop %ss
2017 1.7 kamil *
2018 1.7 kamil * We are still here, and didn't receive the #DB. After we execute
2019 1.7 kamil * this instruction, the effect of "pop %ss" will disappear, and
2020 1.7 kamil * we will receive the #DB for real.
2021 1.7 kamil *
2022 1.7 kamil * int $4
2023 1.7 kamil *
2024 1.7 kamil * Here the bug happens. We executed "int $4", so we entered the
2025 1.7 kamil * kernel, with interrupts disabled. The #DB that was pending is
2026 1.7 kamil * received. But, it is received immediately in kernel mode, and is
2027 1.7 kamil * _NOT_ received when interrupts are enabled again.
2028 1.7 kamil *
2029 1.7 kamil * It means that, in the first instruction of the $4 handler, we
2030 1.7 kamil * think we are safe with interrupts disabled. But we aren't, and
2031 1.7 kamil * just got interrupted.
2032 1.7 kamil *
2033 1.7 kamil * The new interrupt handler doesn't handle this particular context:
2034 1.7 kamil * we are entered in kernel mode, the previous context was kernel
2035 1.7 kamil * mode too but it still had the user context loaded.
2036 1.7 kamil *
2037 1.7 kamil * We find ourselves not doing a 'swapgs'. At the end of the day, it
2038 1.7 kamil * means that we call trap() with a curcpu() that is fully
2039 1.7 kamil * controllable by userland. From then on, it is easy to escalate
2040 1.7 kamil * privileges.
2041 1.7 kamil *
2042 1.7 kamil * With SVS it also means we don't switch CR3, so this results in a
2043 1.7 kamil * triple fault, which this time cannot be turned to a privilege
2044 1.7 kamil * escalation.
2045 1.7 kamil */
2046 1.7 kamil
2047 1.7 kamil #if __x86_64__
2048 1.7 kamil #if __PIE__
2049 1.7 kamil void *csRIP;
2050 1.7 kamil
2051 1.7 kamil csRIP = malloc(sizeof(int) + sizeof(short));
2052 1.7 kamil FORKEE_ASSERT(csRIP != NULL);
2053 1.7 kamil
2054 1.7 kamil __asm__ __volatile__(
2055 1.7 kamil " leal 24(%%eip), %%eax\n\t"
2056 1.7 kamil " movq %0, %%rdx\n\t"
2057 1.7 kamil " movl %%eax, (%%rdx)\n\t"
2058 1.7 kamil " movw $0x73, 4(%%rdx)\n\t"
2059 1.7 kamil " movq %1, %%rax\n\t"
2060 1.7 kamil " ljmp *(%%rax)\n\t"
2061 1.7 kamil " .code32\n\t"
2062 1.7 kamil " movl $0x5000, %%esp\n\t"
2063 1.7 kamil " pop %%ss\n\t"
2064 1.7 kamil " int $4\n\t"
2065 1.7 kamil " .code64\n\t"
2066 1.7 kamil : "=m"(csRIP)
2067 1.7 kamil : "m"(csRIP)
2068 1.7 kamil : "%rax", "%rdx", "%rsp"
2069 1.7 kamil );
2070 1.7 kamil #else /* !__PIE__ */
2071 1.7 kamil __asm__ __volatile__(
2072 1.7 kamil " movq $farjmp32, %%rax\n\t"
2073 1.7 kamil " ljmp *(%%rax)\n\t"
2074 1.7 kamil "farjmp32:\n\t"
2075 1.7 kamil " .long trigger32\n\t"
2076 1.7 kamil " .word 0x73\n\t"
2077 1.7 kamil " .code32\n\t"
2078 1.7 kamil "trigger32:\n\t"
2079 1.7 kamil " movl $0x5000, %%esp\n\t"
2080 1.7 kamil " pop %%ss\n\t"
2081 1.7 kamil " int $4\n\t"
2082 1.7 kamil " .code64\n\t"
2083 1.7 kamil :
2084 1.7 kamil :
2085 1.7 kamil : "%rax", "%rsp"
2086 1.7 kamil );
2087 1.7 kamil #endif
2088 1.7 kamil #elif __i386__
2089 1.7 kamil __asm__ __volatile__(
2090 1.7 kamil "movl $0x5000, %%esp\n\t"
2091 1.7 kamil "pop %%ss\n\t"
2092 1.7 kamil "int $4\n\t"
2093 1.7 kamil :
2094 1.7 kamil :
2095 1.7 kamil : "%esp"
2096 1.7 kamil );
2097 1.7 kamil #endif
2098 1.7 kamil }
2099 1.7 kamil
2100 1.7 kamil ATF_TC_BODY(x86_cve_2018_8897, tc)
2101 1.7 kamil {
2102 1.7 kamil const int sigval = SIGSTOP;
2103 1.7 kamil pid_t child, wpid;
2104 1.7 kamil #if defined(TWAIT_HAVE_STATUS)
2105 1.7 kamil int status;
2106 1.7 kamil #endif
2107 1.7 kamil char *trap_page;
2108 1.7 kamil struct dbreg db;
2109 1.7 kamil
2110 1.7 kamil
2111 1.7 kamil if (!can_we_set_dbregs()) {
2112 1.7 kamil atf_tc_skip("Either run this test as root or set sysctl(3) "
2113 1.7 kamil "security.models.extensions.user_set_dbregs to 1");
2114 1.7 kamil }
2115 1.7 kamil
2116 1.7 kamil DPRINTF("Before forking process PID=%d\n", getpid());
2117 1.7 kamil SYSCALL_REQUIRE((child = fork()) != -1);
2118 1.7 kamil if (child == 0) {
2119 1.7 kamil DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
2120 1.7 kamil FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
2121 1.7 kamil
2122 1.7 kamil trap_page = mmap((void *)X86_CVE_2018_8897_PAGE,
2123 1.7 kamil sysconf(_SC_PAGESIZE), PROT_READ|PROT_WRITE,
2124 1.7 kamil MAP_FIXED|MAP_ANON|MAP_PRIVATE, -1, 0);
2125 1.7 kamil
2126 1.7 kamil /* trigger page fault */
2127 1.7 kamil memset(trap_page, 0, sysconf(_SC_PAGESIZE));
2128 1.7 kamil
2129 1.7 kamil // kernel GDT
2130 1.7 kamil #if __x86_64__
2131 1.7 kamil /* SS selector (descriptor 9 (0x4f >> 3)) */
2132 1.7 kamil *trap_page = 0x4f;
2133 1.7 kamil #elif __i386__
2134 1.7 kamil /* SS selector (descriptor 4 (0x23 >> 3)) */
2135 1.7 kamil *trap_page = 0x23;
2136 1.7 kamil #endif
2137 1.7 kamil
2138 1.7 kamil DPRINTF("Before raising %s from child\n", strsignal(sigval));
2139 1.7 kamil FORKEE_ASSERT(raise(sigval) == 0);
2140 1.7 kamil
2141 1.7 kamil x86_cve_2018_8897_trigger();
2142 1.7 kamil
2143 1.7 kamil /* NOTREACHED */
2144 1.7 kamil FORKEE_ASSERTX(0 && "This shall not be reached");
2145 1.7 kamil }
2146 1.7 kamil DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
2147 1.7 kamil
2148 1.7 kamil DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2149 1.7 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2150 1.7 kamil
2151 1.7 kamil validate_status_stopped(status, sigval);
2152 1.7 kamil
2153 1.7 kamil DPRINTF("Call GETDBREGS for the child process\n");
2154 1.7 kamil SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &db, 0) != -1);
2155 1.7 kamil
2156 1.7 kamil /*
2157 1.7 kamil * Set up the dbregs. We put the 0x5000 address in DR0.
2158 1.7 kamil * It means that, the first time we touch this, the CPU will trigger a
2159 1.7 kamil * #DB exception.
2160 1.7 kamil */
2161 1.7 kamil db.dr[0] = X86_CVE_2018_8897_PAGE;
2162 1.7 kamil db.dr[7] = 0x30003;
2163 1.7 kamil
2164 1.7 kamil DPRINTF("Call SETDBREGS for the child process\n");
2165 1.7 kamil SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &db, 0) != -1);
2166 1.7 kamil
2167 1.7 kamil DPRINTF("Before resuming the child process where it left off and "
2168 1.7 kamil "without signal to be sent\n");
2169 1.7 kamil SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
2170 1.7 kamil
2171 1.7 kamil DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2172 1.7 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2173 1.7 kamil
2174 1.7 kamil // In this test we receive SIGFPE, is this appropriate?
2175 1.7 kamil // validate_status_stopped(status, SIGFPE);
2176 1.7 kamil
2177 1.7 kamil DPRINTF("Kill the child process\n");
2178 1.7 kamil SYSCALL_REQUIRE(ptrace(PT_KILL, child, NULL, 0) != -1);
2179 1.7 kamil
2180 1.7 kamil DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2181 1.7 kamil TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2182 1.7 kamil
2183 1.7 kamil validate_status_signaled(status, SIGKILL, 0);
2184 1.7 kamil
2185 1.7 kamil DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2186 1.7 kamil TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
2187 1.7 kamil }
2188 1.7 kamil
2189 1.7 kamil /// ----------------------------------------------------------------------------
2190 1.7 kamil
2191 1.1 kamil #define ATF_TP_ADD_TCS_PTRACE_WAIT_X86() \
2192 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_print); \
2193 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr0); \
2194 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr1); \
2195 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr2); \
2196 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr3); \
2197 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr0_yield); \
2198 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr1_yield); \
2199 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr2_yield); \
2200 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr3_yield); \
2201 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr0_continued); \
2202 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr1_continued); \
2203 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr2_continued); \
2204 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr3_continued); \
2205 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_writeonly_byte); \
2206 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_writeonly_byte); \
2207 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_writeonly_byte); \
2208 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_writeonly_byte); \
2209 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_writeonly_2bytes); \
2210 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_writeonly_2bytes); \
2211 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_writeonly_2bytes); \
2212 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_writeonly_2bytes); \
2213 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_writeonly_4bytes); \
2214 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_writeonly_4bytes); \
2215 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_writeonly_4bytes); \
2216 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_writeonly_4bytes); \
2217 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_write_byte); \
2218 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_write_byte); \
2219 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_write_byte); \
2220 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_write_byte); \
2221 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_write_2bytes); \
2222 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_write_2bytes); \
2223 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_write_2bytes); \
2224 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_write_2bytes); \
2225 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_write_4bytes); \
2226 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_write_4bytes); \
2227 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_write_4bytes); \
2228 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_write_4bytes); \
2229 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_read_byte); \
2230 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_read_byte); \
2231 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_read_byte); \
2232 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_read_byte); \
2233 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_read_2bytes); \
2234 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_read_2bytes); \
2235 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_read_2bytes); \
2236 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_read_2bytes); \
2237 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_read_4bytes); \
2238 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_read_4bytes); \
2239 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_read_4bytes); \
2240 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_read_4bytes); \
2241 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_code); \
2242 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_code); \
2243 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_code); \
2244 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_code); \
2245 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_dont_inherit_lwp); \
2246 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_dont_inherit_lwp); \
2247 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_dont_inherit_lwp); \
2248 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_dont_inherit_lwp); \
2249 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_dont_inherit_execve); \
2250 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_dont_inherit_execve); \
2251 1.1 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_dont_inherit_execve); \
2252 1.7 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_dont_inherit_execve); \
2253 1.7 kamil ATF_TP_ADD_TC_HAVE_DBREGS(tp, x86_cve_2018_8897);
2254 1.1 kamil #else
2255 1.1 kamil #define ATF_TP_ADD_TCS_PTRACE_WAIT_X86()
2256 1.1 kamil #endif
2257