t_ptrace_x86_wait.h revision 1.23 1 /* $NetBSD: t_ptrace_x86_wait.h,v 1.23 2020/02/14 04:20:59 christos Exp $ */
2
3 /*-
4 * Copyright (c) 2016, 2017, 2018, 2019 The NetBSD Foundation, Inc.
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 *
16 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
17 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
18 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
20 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
21 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
22 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
23 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
24 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
25 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
26 * POSSIBILITY OF SUCH DAMAGE.
27 */
28
29 #if defined(__i386__) || defined(__x86_64__)
30 union u {
31 unsigned long raw;
32 struct {
33 unsigned long local_dr0_breakpoint : 1; /* 0 */
34 unsigned long global_dr0_breakpoint : 1; /* 1 */
35 unsigned long local_dr1_breakpoint : 1; /* 2 */
36 unsigned long global_dr1_breakpoint : 1; /* 3 */
37 unsigned long local_dr2_breakpoint : 1; /* 4 */
38 unsigned long global_dr2_breakpoint : 1; /* 5 */
39 unsigned long local_dr3_breakpoint : 1; /* 6 */
40 unsigned long global_dr3_breakpoint : 1; /* 7 */
41 unsigned long local_exact_breakpt : 1; /* 8 */
42 unsigned long global_exact_breakpt : 1; /* 9 */
43 unsigned long reserved_10 : 1; /* 10 */
44 unsigned long rest_trans_memory : 1; /* 11 */
45 unsigned long reserved_12 : 1; /* 12 */
46 unsigned long general_detect_enable : 1; /* 13 */
47 unsigned long reserved_14 : 1; /* 14 */
48 unsigned long reserved_15 : 1; /* 15 */
49 unsigned long condition_dr0 : 2; /* 16-17 */
50 unsigned long len_dr0 : 2; /* 18-19 */
51 unsigned long condition_dr1 : 2; /* 20-21 */
52 unsigned long len_dr1 : 2; /* 22-23 */
53 unsigned long condition_dr2 : 2; /* 24-25 */
54 unsigned long len_dr2 : 2; /* 26-27 */
55 unsigned long condition_dr3 : 2; /* 28-29 */
56 unsigned long len_dr3 : 2; /* 30-31 */
57 } bits;
58 };
59
60 ATF_TC(dbregs_print);
61 ATF_TC_HEAD(dbregs_print, tc)
62 {
63 atf_tc_set_md_var(tc, "descr",
64 "Verify plain PT_GETDBREGS with printing Debug Registers");
65 }
66
67 ATF_TC_BODY(dbregs_print, tc)
68 {
69 const int exitval = 5;
70 const int sigval = SIGSTOP;
71 pid_t child, wpid;
72 #if defined(TWAIT_HAVE_STATUS)
73 int status;
74 #endif
75 struct dbreg r;
76 size_t i;
77
78 DPRINTF("Before forking process PID=%d\n", getpid());
79 SYSCALL_REQUIRE((child = fork()) != -1);
80 if (child == 0) {
81 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
82 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
83
84 DPRINTF("Before raising %s from child\n", strsignal(sigval));
85 FORKEE_ASSERT(raise(sigval) == 0);
86
87 DPRINTF("Before exiting of the child process\n");
88 _exit(exitval);
89 }
90 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
91
92 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
93 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
94
95 validate_status_stopped(status, sigval);
96
97 DPRINTF("Call GETDBREGS for the child process\n");
98 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r, 0) != -1);
99
100 DPRINTF("State of the debug registers:\n");
101 for (i = 0; i < __arraycount(r.dr); i++)
102 DPRINTF("r[%zu]=%" PRIxREGISTER "\n", i, r.dr[i]);
103
104 DPRINTF("Before resuming the child process where it left off and "
105 "without signal to be sent\n");
106 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
107
108 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
109 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
110
111 validate_status_exited(status, exitval);
112
113 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
114 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
115 }
116
117
118 enum dbreg_preserve_mode {
119 dbreg_preserve_mode_none,
120 dbreg_preserve_mode_yield,
121 dbreg_preserve_mode_continued
122 };
123
124 static void
125 dbreg_preserve(int reg, enum dbreg_preserve_mode mode)
126 {
127 const int exitval = 5;
128 const int sigval = SIGSTOP;
129 pid_t child, wpid;
130 #if defined(TWAIT_HAVE_STATUS)
131 int status;
132 #endif
133 struct dbreg r1;
134 struct dbreg r2;
135 size_t i;
136 int watchme;
137
138 if (!can_we_set_dbregs()) {
139 atf_tc_skip("Either run this test as root or set sysctl(3) "
140 "security.models.extensions.user_set_dbregs to 1");
141 }
142
143 DPRINTF("Before forking process PID=%d\n", getpid());
144 SYSCALL_REQUIRE((child = fork()) != -1);
145 if (child == 0) {
146 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
147 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
148
149 DPRINTF("Before raising %s from child\n", strsignal(sigval));
150 FORKEE_ASSERT(raise(sigval) == 0);
151
152 if (mode == dbreg_preserve_mode_continued) {
153 DPRINTF("Before raising %s from child\n",
154 strsignal(sigval));
155 FORKEE_ASSERT(raise(sigval) == 0);
156 }
157
158 DPRINTF("Before exiting of the child process\n");
159 _exit(exitval);
160 }
161 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
162
163 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
164 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
165
166 validate_status_stopped(status, sigval);
167
168 DPRINTF("Call GETDBREGS for the child process (r1)\n");
169 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
170
171 DPRINTF("State of the debug registers (r1):\n");
172 for (i = 0; i < __arraycount(r1.dr); i++)
173 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
174
175 r1.dr[reg] = (long)(intptr_t)&watchme;
176 DPRINTF("Set DR0 (r1.dr[%d]) to new value %" PRIxREGISTER "\n",
177 reg, r1.dr[reg]);
178
179 DPRINTF("New state of the debug registers (r1):\n");
180 for (i = 0; i < __arraycount(r1.dr); i++)
181 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
182
183 DPRINTF("Call SETDBREGS for the child process (r1)\n");
184 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
185
186 switch (mode) {
187 case dbreg_preserve_mode_none:
188 break;
189 case dbreg_preserve_mode_yield:
190 DPRINTF("Yields a processor voluntarily and gives other "
191 "threads a chance to run without waiting for an "
192 "involuntary preemptive switch\n");
193 sched_yield();
194 break;
195 case dbreg_preserve_mode_continued:
196 DPRINTF("Call CONTINUE for the child process\n");
197 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
198
199 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
200 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
201
202 validate_status_stopped(status, sigval);
203 break;
204 }
205
206 DPRINTF("Call GETDBREGS for the child process (r2)\n");
207 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r2, 0) != -1);
208
209 DPRINTF("Assert that (r1) and (r2) are the same\n");
210 SYSCALL_REQUIRE(memcmp(&r1, &r2, sizeof(r1)) == 0);
211
212 DPRINTF("Before resuming the child process where it left off and "
213 "without signal to be sent\n");
214 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
215
216 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
217 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
218
219 validate_status_exited(status, exitval);
220
221 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
222 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
223 }
224
225
226 ATF_TC(dbregs_preserve_dr0);
227 ATF_TC_HEAD(dbregs_preserve_dr0, tc)
228 {
229 atf_tc_set_md_var(tc, "descr",
230 "Verify that setting DR0 is preserved across ptrace(2) calls");
231 }
232
233 ATF_TC_BODY(dbregs_preserve_dr0, tc)
234 {
235 dbreg_preserve(0, dbreg_preserve_mode_none);
236 }
237
238 ATF_TC(dbregs_preserve_dr1);
239 ATF_TC_HEAD(dbregs_preserve_dr1, tc)
240 {
241 atf_tc_set_md_var(tc, "descr",
242 "Verify that setting DR1 is preserved across ptrace(2) calls");
243 }
244
245 ATF_TC_BODY(dbregs_preserve_dr1, tc)
246 {
247 dbreg_preserve(1, dbreg_preserve_mode_none);
248 }
249
250 ATF_TC(dbregs_preserve_dr2);
251 ATF_TC_HEAD(dbregs_preserve_dr2, tc)
252 {
253 atf_tc_set_md_var(tc, "descr",
254 "Verify that setting DR2 is preserved across ptrace(2) calls");
255 }
256
257 ATF_TC_BODY(dbregs_preserve_dr2, tc)
258 {
259 dbreg_preserve(2, dbreg_preserve_mode_none);
260 }
261
262 ATF_TC(dbregs_preserve_dr3);
263 ATF_TC_HEAD(dbregs_preserve_dr3, tc)
264 {
265 atf_tc_set_md_var(tc, "descr",
266 "Verify that setting DR3 is preserved across ptrace(2) calls");
267 }
268
269 ATF_TC_BODY(dbregs_preserve_dr3, tc)
270 {
271 dbreg_preserve(3, dbreg_preserve_mode_none);
272 }
273
274 ATF_TC(dbregs_preserve_dr0_yield);
275 ATF_TC_HEAD(dbregs_preserve_dr0_yield, tc)
276 {
277 atf_tc_set_md_var(tc, "descr",
278 "Verify that setting DR0 is preserved across ptrace(2) calls with "
279 "scheduler yield");
280 }
281
282 ATF_TC_BODY(dbregs_preserve_dr0_yield, tc)
283 {
284 dbreg_preserve(0, dbreg_preserve_mode_yield);
285 }
286
287 ATF_TC(dbregs_preserve_dr1_yield);
288 ATF_TC_HEAD(dbregs_preserve_dr1_yield, tc)
289 {
290 atf_tc_set_md_var(tc, "descr",
291 "Verify that setting DR1 is preserved across ptrace(2) calls with "
292 "scheduler yield");
293 }
294
295 ATF_TC_BODY(dbregs_preserve_dr1_yield, tc)
296 {
297 dbreg_preserve(0, dbreg_preserve_mode_yield);
298 }
299
300 ATF_TC(dbregs_preserve_dr2_yield);
301 ATF_TC_HEAD(dbregs_preserve_dr2_yield, tc)
302 {
303 atf_tc_set_md_var(tc, "descr",
304 "Verify that setting DR2 is preserved across ptrace(2) calls with "
305 "scheduler yield");
306 }
307
308 ATF_TC_BODY(dbregs_preserve_dr2_yield, tc)
309 {
310 dbreg_preserve(0, dbreg_preserve_mode_yield);
311 }
312
313
314 ATF_TC(dbregs_preserve_dr3_yield);
315 ATF_TC_HEAD(dbregs_preserve_dr3_yield, tc)
316 {
317 atf_tc_set_md_var(tc, "descr",
318 "Verify that setting DR3 is preserved across ptrace(2) calls with "
319 "scheduler yield");
320 }
321
322 ATF_TC_BODY(dbregs_preserve_dr3_yield, tc)
323 {
324 dbreg_preserve(3, dbreg_preserve_mode_yield);
325 }
326
327 ATF_TC(dbregs_preserve_dr0_continued);
328 ATF_TC_HEAD(dbregs_preserve_dr0_continued, tc)
329 {
330 atf_tc_set_md_var(tc, "descr",
331 "Verify that setting DR0 is preserved across ptrace(2) calls and "
332 "with continued child");
333 }
334
335 ATF_TC_BODY(dbregs_preserve_dr0_continued, tc)
336 {
337 dbreg_preserve(0, dbreg_preserve_mode_continued);
338 }
339
340 ATF_TC(dbregs_preserve_dr1_continued);
341 ATF_TC_HEAD(dbregs_preserve_dr1_continued, tc)
342 {
343 atf_tc_set_md_var(tc, "descr",
344 "Verify that setting DR1 is preserved across ptrace(2) calls and "
345 "with continued child");
346 }
347
348 ATF_TC_BODY(dbregs_preserve_dr1_continued, tc)
349 {
350 dbreg_preserve(1, dbreg_preserve_mode_continued);
351 }
352
353 ATF_TC(dbregs_preserve_dr2_continued);
354 ATF_TC_HEAD(dbregs_preserve_dr2_continued, tc)
355 {
356 atf_tc_set_md_var(tc, "descr",
357 "Verify that setting DR2 is preserved across ptrace(2) calls and "
358 "with continued child");
359 }
360
361 ATF_TC_BODY(dbregs_preserve_dr2_continued, tc)
362 {
363 dbreg_preserve(2, dbreg_preserve_mode_continued);
364 }
365
366 ATF_TC(dbregs_preserve_dr3_continued);
367 ATF_TC_HEAD(dbregs_preserve_dr3_continued, tc)
368 {
369 atf_tc_set_md_var(tc, "descr",
370 "Verify that setting DR3 is preserved across ptrace(2) calls and "
371 "with continued child");
372 }
373
374 ATF_TC_BODY(dbregs_preserve_dr3_continued, tc)
375 {
376 dbreg_preserve(3, dbreg_preserve_mode_continued);
377 }
378
379
380 static void
381 dbregs_trap_variable(int reg, int cond, int len, bool write)
382 {
383 const int exitval = 5;
384 const int sigval = SIGSTOP;
385 pid_t child, wpid;
386 #if defined(TWAIT_HAVE_STATUS)
387 int status;
388 #endif
389 struct dbreg r1;
390 size_t i;
391 volatile int watchme = 0;
392 union u dr7;
393
394 struct ptrace_siginfo info;
395 memset(&info, 0, sizeof(info));
396
397 if (!can_we_set_dbregs()) {
398 atf_tc_skip("Either run this test as root or set sysctl(3) "
399 "security.models.extensions.user_set_dbregs to 1");
400 }
401
402 dr7.raw = 0;
403 switch (reg) {
404 case 0:
405 dr7.bits.global_dr0_breakpoint = 1;
406 dr7.bits.condition_dr0 = cond;
407 dr7.bits.len_dr0 = len;
408 break;
409 case 1:
410 dr7.bits.global_dr1_breakpoint = 1;
411 dr7.bits.condition_dr1 = cond;
412 dr7.bits.len_dr1 = len;
413 break;
414 case 2:
415 dr7.bits.global_dr2_breakpoint = 1;
416 dr7.bits.condition_dr2 = cond;
417 dr7.bits.len_dr2 = len;
418 break;
419 case 3:
420 dr7.bits.global_dr3_breakpoint = 1;
421 dr7.bits.condition_dr3 = cond;
422 dr7.bits.len_dr3 = len;
423 break;
424 }
425
426 DPRINTF("Before forking process PID=%d\n", getpid());
427 SYSCALL_REQUIRE((child = fork()) != -1);
428 if (child == 0) {
429 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
430 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
431
432 DPRINTF("Before raising %s from child\n", strsignal(sigval));
433 FORKEE_ASSERT(raise(sigval) == 0);
434
435 if (write)
436 watchme = 1;
437 else
438 printf("watchme=%d\n", watchme);
439
440 DPRINTF("Before raising %s from child\n", strsignal(sigval));
441 FORKEE_ASSERT(raise(sigval) == 0);
442
443 DPRINTF("Before exiting of the child process\n");
444 _exit(exitval);
445 }
446 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
447
448 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
449 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
450
451 validate_status_stopped(status, sigval);
452
453 DPRINTF("Call GETDBREGS for the child process (r1)\n");
454 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
455
456 DPRINTF("State of the debug registers (r1):\n");
457 for (i = 0; i < __arraycount(r1.dr); i++)
458 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
459
460 r1.dr[reg] = (long)(intptr_t)&watchme;
461 DPRINTF("Set DR%d (r1.dr[%d]) to new value %" PRIxREGISTER "\n",
462 reg, reg, r1.dr[reg]);
463
464 r1.dr[7] = dr7.raw;
465 DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
466 r1.dr[7]);
467
468 DPRINTF("New state of the debug registers (r1):\n");
469 for (i = 0; i < __arraycount(r1.dr); i++)
470 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
471
472 DPRINTF("Call SETDBREGS for the child process (r1)\n");
473 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
474
475 DPRINTF("Call CONTINUE for the child process\n");
476 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
477
478 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
479 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
480
481 validate_status_stopped(status, SIGTRAP);
482
483 DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
484 SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
485
486 DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
487 DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
488 info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
489 info.psi_siginfo.si_errno);
490
491 DPRINTF("Before checking siginfo_t\n");
492 ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, SIGTRAP);
493 ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_DBREG);
494
495 DPRINTF("Call CONTINUE for the child process\n");
496 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
497
498 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
499 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
500
501 validate_status_stopped(status, sigval);
502
503 DPRINTF("Before resuming the child process where it left off and "
504 "without signal to be sent\n");
505 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
506
507 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
508 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
509
510 validate_status_exited(status, exitval);
511
512 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
513 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
514 }
515
516 ATF_TC(dbregs_dr0_trap_variable_writeonly_byte);
517 ATF_TC_HEAD(dbregs_dr0_trap_variable_writeonly_byte, tc)
518 {
519 atf_tc_set_md_var(tc, "descr",
520 "Verify that setting trap with DR0 triggers SIGTRAP "
521 "(break on data writes only and 1 byte mode)");
522 }
523
524 ATF_TC_BODY(dbregs_dr0_trap_variable_writeonly_byte, tc)
525 {
526 /* 0b01 -- break on data write only */
527 /* 0b00 -- 1 byte */
528
529 dbregs_trap_variable(0, 1, 0, true);
530 }
531
532 ATF_TC(dbregs_dr1_trap_variable_writeonly_byte);
533 ATF_TC_HEAD(dbregs_dr1_trap_variable_writeonly_byte, tc)
534 {
535 atf_tc_set_md_var(tc, "descr",
536 "Verify that setting trap with DR1 triggers SIGTRAP "
537 "(break on data writes only and 1 byte mode)");
538 }
539
540 ATF_TC_BODY(dbregs_dr1_trap_variable_writeonly_byte, tc)
541 {
542 /* 0b01 -- break on data write only */
543 /* 0b00 -- 1 byte */
544
545 dbregs_trap_variable(1, 1, 0, true);
546 }
547
548 ATF_TC(dbregs_dr2_trap_variable_writeonly_byte);
549 ATF_TC_HEAD(dbregs_dr2_trap_variable_writeonly_byte, tc)
550 {
551 atf_tc_set_md_var(tc, "descr",
552 "Verify that setting trap with DR2 triggers SIGTRAP "
553 "(break on data writes only and 1 byte mode)");
554 }
555
556 ATF_TC_BODY(dbregs_dr2_trap_variable_writeonly_byte, tc)
557 {
558 /* 0b01 -- break on data write only */
559 /* 0b00 -- 1 byte */
560
561 dbregs_trap_variable(2, 1, 0, true);
562 }
563
564 ATF_TC(dbregs_dr3_trap_variable_writeonly_byte);
565 ATF_TC_HEAD(dbregs_dr3_trap_variable_writeonly_byte, tc)
566 {
567 atf_tc_set_md_var(tc, "descr",
568 "Verify that setting trap with DR3 triggers SIGTRAP "
569 "(break on data writes only and 1 byte mode)");
570 }
571
572 ATF_TC_BODY(dbregs_dr3_trap_variable_writeonly_byte, tc)
573 {
574 /* 0b01 -- break on data write only */
575 /* 0b00 -- 1 byte */
576
577 dbregs_trap_variable(3, 1, 0, true);
578 }
579
580 ATF_TC(dbregs_dr0_trap_variable_writeonly_2bytes);
581 ATF_TC_HEAD(dbregs_dr0_trap_variable_writeonly_2bytes, tc)
582 {
583 atf_tc_set_md_var(tc, "descr",
584 "Verify that setting trap with DR0 triggers SIGTRAP "
585 "(break on data writes only and 2 bytes mode)");
586 }
587
588 ATF_TC_BODY(dbregs_dr0_trap_variable_writeonly_2bytes, tc)
589 {
590 /* 0b01 -- break on data write only */
591 /* 0b01 -- 2 bytes */
592
593 dbregs_trap_variable(0, 1, 1, true);
594 }
595
596 ATF_TC(dbregs_dr1_trap_variable_writeonly_2bytes);
597 ATF_TC_HEAD(dbregs_dr1_trap_variable_writeonly_2bytes, tc)
598 {
599 atf_tc_set_md_var(tc, "descr",
600 "Verify that setting trap with DR1 triggers SIGTRAP "
601 "(break on data writes only and 2 bytes mode)");
602 }
603
604 ATF_TC_BODY(dbregs_dr1_trap_variable_writeonly_2bytes, tc)
605 {
606 /* 0b01 -- break on data write only */
607 /* 0b01 -- 2 bytes */
608
609 dbregs_trap_variable(1, 1, 1, true);
610 }
611
612 ATF_TC(dbregs_dr2_trap_variable_writeonly_2bytes);
613 ATF_TC_HEAD(dbregs_dr2_trap_variable_writeonly_2bytes, tc)
614 {
615 atf_tc_set_md_var(tc, "descr",
616 "Verify that setting trap with DR2 triggers SIGTRAP "
617 "(break on data writes only and 2 bytes mode)");
618 }
619
620 ATF_TC_BODY(dbregs_dr2_trap_variable_writeonly_2bytes, tc)
621 {
622 /* 0b01 -- break on data write only */
623 /* 0b01 -- 2 bytes */
624
625 dbregs_trap_variable(2, 1, 1, true);
626 }
627
628 ATF_TC(dbregs_dr3_trap_variable_writeonly_2bytes);
629 ATF_TC_HEAD(dbregs_dr3_trap_variable_writeonly_2bytes, tc)
630 {
631 atf_tc_set_md_var(tc, "descr",
632 "Verify that setting trap with DR3 triggers SIGTRAP "
633 "(break on data writes only and 2 bytes mode)");
634 }
635
636 ATF_TC_BODY(dbregs_dr3_trap_variable_writeonly_2bytes, tc)
637 {
638 /* 0b01 -- break on data write only */
639 /* 0b01 -- 2 bytes */
640
641 dbregs_trap_variable(3, 1, 1, true);
642 }
643
644 ATF_TC(dbregs_dr0_trap_variable_writeonly_4bytes);
645 ATF_TC_HEAD(dbregs_dr0_trap_variable_writeonly_4bytes, tc)
646 {
647 atf_tc_set_md_var(tc, "descr",
648 "Verify that setting trap with DR0 triggers SIGTRAP "
649 "(break on data writes only and 4 bytes mode)");
650 }
651
652 ATF_TC_BODY(dbregs_dr0_trap_variable_writeonly_4bytes, tc)
653 {
654 /* 0b01 -- break on data write only */
655 /* 0b11 -- 4 bytes */
656
657 dbregs_trap_variable(0, 1, 3, true);
658 }
659
660 ATF_TC(dbregs_dr1_trap_variable_writeonly_4bytes);
661 ATF_TC_HEAD(dbregs_dr1_trap_variable_writeonly_4bytes, tc)
662 {
663 atf_tc_set_md_var(tc, "descr",
664 "Verify that setting trap with DR1 triggers SIGTRAP "
665 "(break on data writes only and 4 bytes mode)");
666 }
667
668 ATF_TC_BODY(dbregs_dr1_trap_variable_writeonly_4bytes, tc)
669 {
670 /* 0b01 -- break on data write only */
671 /* 0b11 -- 4 bytes */
672
673 dbregs_trap_variable(1, 1, 3, true);
674 }
675
676 ATF_TC(dbregs_dr2_trap_variable_writeonly_4bytes);
677 ATF_TC_HEAD(dbregs_dr2_trap_variable_writeonly_4bytes, tc)
678 {
679 atf_tc_set_md_var(tc, "descr",
680 "Verify that setting trap with DR2 triggers SIGTRAP "
681 "(break on data writes only and 4 bytes mode)");
682 }
683
684 ATF_TC_BODY(dbregs_dr2_trap_variable_writeonly_4bytes, tc)
685 {
686 /* 0b01 -- break on data write only */
687 /* 0b11 -- 4 bytes */
688
689 dbregs_trap_variable(2, 1, 3, true);
690 }
691
692 ATF_TC(dbregs_dr3_trap_variable_writeonly_4bytes);
693 ATF_TC_HEAD(dbregs_dr3_trap_variable_writeonly_4bytes, tc)
694 {
695 atf_tc_set_md_var(tc, "descr",
696 "Verify that setting trap with DR3 triggers SIGTRAP "
697 "(break on data writes only and 4 bytes mode)");
698 }
699
700 ATF_TC_BODY(dbregs_dr3_trap_variable_writeonly_4bytes, tc)
701 {
702 /* 0b01 -- break on data write only */
703 /* 0b11 -- 4 bytes */
704
705 dbregs_trap_variable(3, 1, 3, true);
706 }
707
708 ATF_TC(dbregs_dr0_trap_variable_readwrite_write_byte);
709 ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_write_byte, tc)
710 {
711 atf_tc_set_md_var(tc, "descr",
712 "Verify that setting trap with DR0 triggers SIGTRAP "
713 "(break on data read/write trap in read 1 byte mode)");
714 }
715
716 ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_write_byte, tc)
717 {
718 /* 0b11 -- break on data write&read */
719 /* 0b00 -- 1 byte */
720
721 dbregs_trap_variable(0, 3, 0, true);
722 }
723
724 ATF_TC(dbregs_dr1_trap_variable_readwrite_write_byte);
725 ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_write_byte, tc)
726 {
727 atf_tc_set_md_var(tc, "descr",
728 "Verify that setting trap with DR1 triggers SIGTRAP "
729 "(break on data read/write trap in read 1 byte mode)");
730 }
731
732 ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_write_byte, tc)
733 {
734 /* 0b11 -- break on data write&read */
735 /* 0b00 -- 1 byte */
736
737 dbregs_trap_variable(1, 3, 0, true);
738 }
739
740 ATF_TC(dbregs_dr2_trap_variable_readwrite_write_byte);
741 ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_write_byte, tc)
742 {
743 atf_tc_set_md_var(tc, "descr",
744 "Verify that setting trap with DR2 triggers SIGTRAP "
745 "(break on data read/write trap in read 1 byte mode)");
746 }
747
748 ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_write_byte, tc)
749 {
750 /* 0b11 -- break on data write&read */
751 /* 0b00 -- 1 byte */
752
753 dbregs_trap_variable(2, 3, 0, true);
754 }
755
756 ATF_TC(dbregs_dr3_trap_variable_readwrite_write_byte);
757 ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_write_byte, tc)
758 {
759 atf_tc_set_md_var(tc, "descr",
760 "Verify that setting trap with DR3 triggers SIGTRAP "
761 "(break on data read/write trap in read 1 byte mode)");
762 }
763
764 ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_write_byte, tc)
765 {
766 /* 0b11 -- break on data write&read */
767 /* 0b00 -- 1 byte */
768
769 dbregs_trap_variable(3, 3, 0, true);
770 }
771
772 ATF_TC(dbregs_dr0_trap_variable_readwrite_write_2bytes);
773 ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_write_2bytes, tc)
774 {
775 atf_tc_set_md_var(tc, "descr",
776 "Verify that setting trap with DR0 triggers SIGTRAP "
777 "(break on data read/write trap in read 2 bytes mode)");
778 }
779
780 ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_write_2bytes, tc)
781 {
782 /* 0b11 -- break on data write&read */
783 /* 0b01 -- 2 bytes */
784
785 dbregs_trap_variable(0, 3, 1, true);
786 }
787
788 ATF_TC(dbregs_dr1_trap_variable_readwrite_write_2bytes);
789 ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_write_2bytes, tc)
790 {
791 atf_tc_set_md_var(tc, "descr",
792 "Verify that setting trap with DR1 triggers SIGTRAP "
793 "(break on data read/write trap in read 2 bytes mode)");
794 }
795
796 ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_write_2bytes, tc)
797 {
798 /* 0b11 -- break on data write&read */
799 /* 0b01 -- 2 bytes */
800
801 dbregs_trap_variable(1, 3, 1, true);
802 }
803
804 ATF_TC(dbregs_dr2_trap_variable_readwrite_write_2bytes);
805 ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_write_2bytes, tc)
806 {
807 atf_tc_set_md_var(tc, "descr",
808 "Verify that setting trap with DR2 triggers SIGTRAP "
809 "(break on data read/write trap in read 2 bytes mode)");
810 }
811
812 ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_write_2bytes, tc)
813 {
814 /* 0b11 -- break on data write&read */
815 /* 0b01 -- 2 bytes */
816
817 dbregs_trap_variable(2, 3, 1, true);
818 }
819
820 ATF_TC(dbregs_dr3_trap_variable_readwrite_write_2bytes);
821 ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_write_2bytes, tc)
822 {
823 atf_tc_set_md_var(tc, "descr",
824 "Verify that setting trap with DR3 triggers SIGTRAP "
825 "(break on data read/write trap in read 2 bytes mode)");
826 }
827
828 ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_write_2bytes, tc)
829 {
830 /* 0b11 -- break on data write&read */
831 /* 0b01 -- 2 bytes */
832
833 dbregs_trap_variable(3, 3, 1, true);
834 }
835
836 ATF_TC(dbregs_dr0_trap_variable_readwrite_write_4bytes);
837 ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_write_4bytes, tc)
838 {
839 atf_tc_set_md_var(tc, "descr",
840 "Verify that setting trap with DR0 triggers SIGTRAP "
841 "(break on data read/write trap in read 4 bytes mode)");
842 }
843
844 ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_write_4bytes, tc)
845 {
846 /* 0b11 -- break on data write&read */
847 /* 0b11 -- 4 bytes */
848
849 dbregs_trap_variable(0, 3, 3, true);
850 }
851
852 ATF_TC(dbregs_dr1_trap_variable_readwrite_write_4bytes);
853 ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_write_4bytes, tc)
854 {
855 atf_tc_set_md_var(tc, "descr",
856 "Verify that setting trap with DR1 triggers SIGTRAP "
857 "(break on data read/write trap in read 4 bytes mode)");
858 }
859
860 ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_write_4bytes, tc)
861 {
862 /* 0b11 -- break on data write&read */
863 /* 0b11 -- 4 bytes */
864
865 dbregs_trap_variable(1, 3, 3, true);
866 }
867
868 ATF_TC(dbregs_dr2_trap_variable_readwrite_write_4bytes);
869 ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_write_4bytes, tc)
870 {
871 atf_tc_set_md_var(tc, "descr",
872 "Verify that setting trap with DR2 triggers SIGTRAP "
873 "(break on data read/write trap in read 4 bytes mode)");
874 }
875
876 ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_write_4bytes, tc)
877 {
878 /* 0b11 -- break on data write&read */
879 /* 0b11 -- 4 bytes */
880
881 dbregs_trap_variable(2, 3, 3, true);
882 }
883
884 ATF_TC(dbregs_dr3_trap_variable_readwrite_write_4bytes);
885 ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_write_4bytes, tc)
886 {
887 atf_tc_set_md_var(tc, "descr",
888 "Verify that setting trap with DR3 triggers SIGTRAP "
889 "(break on data read/write trap in read 4 bytes mode)");
890 }
891
892 ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_write_4bytes, tc)
893 {
894 /* 0b11 -- break on data write&read */
895 /* 0b11 -- 4 bytes */
896
897 dbregs_trap_variable(3, 3, 3, true);
898 }
899
900 ATF_TC(dbregs_dr0_trap_variable_readwrite_read_byte);
901 ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_read_byte, tc)
902 {
903 atf_tc_set_md_var(tc, "descr",
904 "Verify that setting trap with DR0 triggers SIGTRAP "
905 "(break on data read/write trap in write 1 byte mode)");
906 }
907
908 ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_read_byte, tc)
909 {
910 /* 0b11 -- break on data write&read */
911 /* 0b00 -- 1 byte */
912
913 dbregs_trap_variable(0, 3, 0, false);
914 }
915
916 ATF_TC(dbregs_dr1_trap_variable_readwrite_read_byte);
917 ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_read_byte, tc)
918 {
919 atf_tc_set_md_var(tc, "descr",
920 "Verify that setting trap with DR1 triggers SIGTRAP "
921 "(break on data read/write trap in write 1 byte mode)");
922 }
923
924 ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_read_byte, tc)
925 {
926 /* 0b11 -- break on data write&read */
927 /* 0b00 -- 1 byte */
928
929 dbregs_trap_variable(1, 3, 0, false);
930 }
931
932 ATF_TC(dbregs_dr2_trap_variable_readwrite_read_byte);
933 ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_read_byte, tc)
934 {
935 atf_tc_set_md_var(tc, "descr",
936 "Verify that setting trap with DR2 triggers SIGTRAP "
937 "(break on data read/write trap in write 1 byte mode)");
938 }
939
940 ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_read_byte, tc)
941 {
942 /* 0b11 -- break on data write&read */
943 /* 0b00 -- 1 byte */
944
945 dbregs_trap_variable(2, 3, 0, false);
946 }
947
948 ATF_TC(dbregs_dr3_trap_variable_readwrite_read_byte);
949 ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_read_byte, tc)
950 {
951 atf_tc_set_md_var(tc, "descr",
952 "Verify that setting trap with DR3 triggers SIGTRAP "
953 "(break on data read/write trap in write 1 byte mode)");
954 }
955
956 ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_read_byte, tc)
957 {
958 /* 0b11 -- break on data write&read */
959 /* 0b00 -- 1 byte */
960
961 dbregs_trap_variable(3, 3, 0, false);
962 }
963
964 ATF_TC(dbregs_dr0_trap_variable_readwrite_read_2bytes);
965 ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_read_2bytes, tc)
966 {
967 atf_tc_set_md_var(tc, "descr",
968 "Verify that setting trap with DR0 triggers SIGTRAP "
969 "(break on data read/write trap in write 2 bytes mode)");
970 }
971
972 ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_read_2bytes, tc)
973 {
974 /* 0b11 -- break on data write&read */
975 /* 0b01 -- 2 bytes */
976
977 dbregs_trap_variable(0, 3, 1, false);
978 }
979
980 ATF_TC(dbregs_dr1_trap_variable_readwrite_read_2bytes);
981 ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_read_2bytes, tc)
982 {
983 atf_tc_set_md_var(tc, "descr",
984 "Verify that setting trap with DR1 triggers SIGTRAP "
985 "(break on data read/write trap in write 2 bytes mode)");
986 }
987
988 ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_read_2bytes, tc)
989 {
990 /* 0b11 -- break on data write&read */
991 /* 0b01 -- 2 bytes */
992
993 dbregs_trap_variable(1, 3, 1, false);
994 }
995
996 ATF_TC(dbregs_dr2_trap_variable_readwrite_read_2bytes);
997 ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_read_2bytes, tc)
998 {
999 atf_tc_set_md_var(tc, "descr",
1000 "Verify that setting trap with DR2 triggers SIGTRAP "
1001 "(break on data read/write trap in write 2 bytes mode)");
1002 }
1003
1004 ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_read_2bytes, tc)
1005 {
1006 /* 0b11 -- break on data write&read */
1007 /* 0b01 -- 2 bytes */
1008
1009 dbregs_trap_variable(2, 3, 1, false);
1010 }
1011
1012 ATF_TC(dbregs_dr3_trap_variable_readwrite_read_2bytes);
1013 ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_read_2bytes, tc)
1014 {
1015 atf_tc_set_md_var(tc, "descr",
1016 "Verify that setting trap with DR3 triggers SIGTRAP "
1017 "(break on data read/write trap in write 2 bytes mode)");
1018 }
1019
1020 ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_read_2bytes, tc)
1021 {
1022 /* 0b11 -- break on data write&read */
1023 /* 0b01 -- 2 bytes */
1024
1025 dbregs_trap_variable(3, 3, 1, false);
1026 }
1027
1028 ATF_TC(dbregs_dr0_trap_variable_readwrite_read_4bytes);
1029 ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_read_4bytes, tc)
1030 {
1031 atf_tc_set_md_var(tc, "descr",
1032 "Verify that setting trap with DR0 triggers SIGTRAP "
1033 "(break on data read/write trap in write 4 bytes mode)");
1034 }
1035
1036 ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_read_4bytes, tc)
1037 {
1038 /* 0b11 -- break on data write&read */
1039 /* 0b11 -- 4 bytes */
1040
1041 dbregs_trap_variable(0, 3, 3, false);
1042 }
1043
1044 ATF_TC(dbregs_dr1_trap_variable_readwrite_read_4bytes);
1045 ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_read_4bytes, tc)
1046 {
1047 atf_tc_set_md_var(tc, "descr",
1048 "Verify that setting trap with DR1 triggers SIGTRAP "
1049 "(break on data read/write trap in write 4 bytes mode)");
1050 }
1051
1052 ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_read_4bytes, tc)
1053 {
1054 /* 0b11 -- break on data write&read */
1055 /* 0b11 -- 4 bytes */
1056
1057 dbregs_trap_variable(1, 3, 3, false);
1058 }
1059
1060 ATF_TC(dbregs_dr2_trap_variable_readwrite_read_4bytes);
1061 ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_read_4bytes, tc)
1062 {
1063 atf_tc_set_md_var(tc, "descr",
1064 "Verify that setting trap with DR2 triggers SIGTRAP "
1065 "(break on data read/write trap in write 4 bytes mode)");
1066 }
1067
1068 ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_read_4bytes, tc)
1069 {
1070 /* 0b11 -- break on data write&read */
1071 /* 0b11 -- 4 bytes */
1072
1073 dbregs_trap_variable(2, 3, 3, false);
1074 }
1075
1076 ATF_TC(dbregs_dr3_trap_variable_readwrite_read_4bytes);
1077 ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_read_4bytes, tc)
1078 {
1079 atf_tc_set_md_var(tc, "descr",
1080 "Verify that setting trap with DR3 triggers SIGTRAP "
1081 "(break on data read/write trap in write 4 bytes mode)");
1082 }
1083
1084 ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_read_4bytes, tc)
1085 {
1086 /* 0b11 -- break on data write&read */
1087 /* 0b11 -- 4 bytes */
1088
1089 dbregs_trap_variable(3, 3, 3, false);
1090 }
1091
1092 #if defined(HAVE_DBREGS)
1093 ATF_TC(dbregs_dr0_trap_code);
1094 ATF_TC_HEAD(dbregs_dr0_trap_code, tc)
1095 {
1096 atf_tc_set_md_var(tc, "descr",
1097 "Verify that setting trap with DR0 triggers SIGTRAP "
1098 "(break on code execution trap)");
1099 }
1100
1101 ATF_TC_BODY(dbregs_dr0_trap_code, tc)
1102 {
1103 const int exitval = 5;
1104 const int sigval = SIGSTOP;
1105 pid_t child, wpid;
1106 #if defined(TWAIT_HAVE_STATUS)
1107 int status;
1108 #endif
1109 struct dbreg r1;
1110 size_t i;
1111 volatile int watchme = 1;
1112 union u dr7;
1113
1114 struct ptrace_siginfo info;
1115 memset(&info, 0, sizeof(info));
1116
1117 if (!can_we_set_dbregs()) {
1118 atf_tc_skip("Either run this test as root or set sysctl(3) "
1119 "security.models.extensions.user_set_dbregs to 1");
1120 }
1121
1122 dr7.raw = 0;
1123 dr7.bits.global_dr0_breakpoint = 1;
1124 dr7.bits.condition_dr0 = 0; /* 0b00 -- break on code execution */
1125 dr7.bits.len_dr0 = 0; /* 0b00 -- 1 byte */
1126
1127 DPRINTF("Before forking process PID=%d\n", getpid());
1128 SYSCALL_REQUIRE((child = fork()) != -1);
1129 if (child == 0) {
1130 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1131 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1132
1133 DPRINTF("Before raising %s from child\n", strsignal(sigval));
1134 FORKEE_ASSERT(raise(sigval) == 0);
1135
1136 printf("check_happy(%d)=%d\n", watchme, check_happy(watchme));
1137
1138 DPRINTF("Before raising %s from child\n", strsignal(sigval));
1139 FORKEE_ASSERT(raise(sigval) == 0);
1140
1141 DPRINTF("Before exiting of the child process\n");
1142 _exit(exitval);
1143 }
1144 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1145
1146 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1147 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1148
1149 validate_status_stopped(status, sigval);
1150
1151 DPRINTF("Call GETDBREGS for the child process (r1)\n");
1152 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1153
1154 DPRINTF("State of the debug registers (r1):\n");
1155 for (i = 0; i < __arraycount(r1.dr); i++)
1156 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1157
1158 r1.dr[0] = (long)(intptr_t)check_happy;
1159 DPRINTF("Set DR0 (r1.dr[0]) to new value %" PRIxREGISTER "\n",
1160 r1.dr[0]);
1161
1162 r1.dr[7] = dr7.raw;
1163 DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1164 r1.dr[7]);
1165
1166 DPRINTF("New state of the debug registers (r1):\n");
1167 for (i = 0; i < __arraycount(r1.dr); i++)
1168 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1169
1170 DPRINTF("Call SETDBREGS for the child process (r1)\n");
1171 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1172
1173 DPRINTF("Call CONTINUE for the child process\n");
1174 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1175
1176 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1177 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1178
1179 validate_status_stopped(status, SIGTRAP);
1180
1181 DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
1182 SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
1183
1184 DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
1185 DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
1186 info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
1187 info.psi_siginfo.si_errno);
1188
1189 DPRINTF("Before checking siginfo_t\n");
1190 ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, SIGTRAP);
1191 ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_DBREG);
1192
1193 DPRINTF("Remove code trap from check_happy=%p\n", check_happy);
1194 dr7.bits.global_dr0_breakpoint = 0;
1195 r1.dr[7] = dr7.raw;
1196 DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1197 r1.dr[7]);
1198
1199 DPRINTF("Call SETDBREGS for the child process (r1)\n");
1200 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1201
1202 DPRINTF("Call CONTINUE for the child process\n");
1203 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1204
1205 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1206 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1207
1208 validate_status_stopped(status, sigval);
1209
1210 DPRINTF("Before resuming the child process where it left off and "
1211 "without signal to be sent\n");
1212 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1213
1214 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1215 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1216
1217 validate_status_exited(status, exitval);
1218
1219 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1220 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1221 }
1222 #endif
1223
1224 #if defined(HAVE_DBREGS)
1225 ATF_TC(dbregs_dr1_trap_code);
1226 ATF_TC_HEAD(dbregs_dr1_trap_code, tc)
1227 {
1228 atf_tc_set_md_var(tc, "descr",
1229 "Verify that setting trap with DR1 triggers SIGTRAP "
1230 "(break on code execution trap)");
1231 }
1232
1233 ATF_TC_BODY(dbregs_dr1_trap_code, tc)
1234 {
1235 const int exitval = 5;
1236 const int sigval = SIGSTOP;
1237 pid_t child, wpid;
1238 #if defined(TWAIT_HAVE_STATUS)
1239 int status;
1240 #endif
1241 struct dbreg r1;
1242 size_t i;
1243 volatile int watchme = 1;
1244 union u dr7;
1245
1246 struct ptrace_siginfo info;
1247 memset(&info, 0, sizeof(info));
1248
1249 if (!can_we_set_dbregs()) {
1250 atf_tc_skip("Either run this test as root or set sysctl(3) "
1251 "security.models.extensions.user_set_dbregs to 1");
1252 }
1253
1254 dr7.raw = 0;
1255 dr7.bits.global_dr1_breakpoint = 1;
1256 dr7.bits.condition_dr1 = 0; /* 0b00 -- break on code execution */
1257 dr7.bits.len_dr1 = 0; /* 0b00 -- 1 byte */
1258
1259 DPRINTF("Before forking process PID=%d\n", getpid());
1260 SYSCALL_REQUIRE((child = fork()) != -1);
1261 if (child == 0) {
1262 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1263 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1264
1265 DPRINTF("Before raising %s from child\n", strsignal(sigval));
1266 FORKEE_ASSERT(raise(sigval) == 0);
1267
1268 printf("check_happy(%d)=%d\n", watchme, check_happy(watchme));
1269
1270 DPRINTF("Before raising %s from child\n", strsignal(sigval));
1271 FORKEE_ASSERT(raise(sigval) == 0);
1272
1273 DPRINTF("Before exiting of the child process\n");
1274 _exit(exitval);
1275 }
1276 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1277
1278 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1279 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1280
1281 validate_status_stopped(status, sigval);
1282
1283 DPRINTF("Call GETDBREGS for the child process (r1)\n");
1284 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1285
1286 DPRINTF("State of the debug registers (r1):\n");
1287 for (i = 0; i < __arraycount(r1.dr); i++)
1288 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1289
1290 r1.dr[1] = (long)(intptr_t)check_happy;
1291 DPRINTF("Set DR1 (r1.dr[1]) to new value %" PRIxREGISTER "\n",
1292 r1.dr[1]);
1293
1294 r1.dr[7] = dr7.raw;
1295 DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1296 r1.dr[7]);
1297
1298 DPRINTF("New state of the debug registers (r1):\n");
1299 for (i = 0; i < __arraycount(r1.dr); i++)
1300 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1301
1302 DPRINTF("Call SETDBREGS for the child process (r1)\n");
1303 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1304
1305 DPRINTF("Call CONTINUE for the child process\n");
1306 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1307
1308 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1309 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1310
1311 validate_status_stopped(status, SIGTRAP);
1312
1313 DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
1314 SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
1315
1316 DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
1317 DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
1318 info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
1319 info.psi_siginfo.si_errno);
1320
1321 DPRINTF("Before checking siginfo_t\n");
1322 ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, SIGTRAP);
1323 ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_DBREG);
1324
1325 DPRINTF("Remove code trap from check_happy=%p\n", check_happy);
1326 dr7.bits.global_dr1_breakpoint = 0;
1327 r1.dr[7] = dr7.raw;
1328 DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1329 r1.dr[7]);
1330
1331 DPRINTF("Call SETDBREGS for the child process (r1)\n");
1332 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1333
1334 DPRINTF("Call CONTINUE for the child process\n");
1335 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1336
1337 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1338 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1339
1340 validate_status_stopped(status, sigval);
1341
1342 DPRINTF("Before resuming the child process where it left off and "
1343 "without signal to be sent\n");
1344 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1345
1346 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1347 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1348
1349 validate_status_exited(status, exitval);
1350
1351 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1352 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1353 }
1354 #endif
1355
1356 #if defined(HAVE_DBREGS)
1357 ATF_TC(dbregs_dr2_trap_code);
1358 ATF_TC_HEAD(dbregs_dr2_trap_code, tc)
1359 {
1360 atf_tc_set_md_var(tc, "descr",
1361 "Verify that setting trap with DR2 triggers SIGTRAP "
1362 "(break on code execution trap)");
1363 }
1364
1365 ATF_TC_BODY(dbregs_dr2_trap_code, tc)
1366 {
1367 const int exitval = 5;
1368 const int sigval = SIGSTOP;
1369 pid_t child, wpid;
1370 #if defined(TWAIT_HAVE_STATUS)
1371 int status;
1372 #endif
1373 struct dbreg r1;
1374 size_t i;
1375 volatile int watchme = 1;
1376 union u dr7;
1377
1378 struct ptrace_siginfo info;
1379 memset(&info, 0, sizeof(info));
1380
1381 if (!can_we_set_dbregs()) {
1382 atf_tc_skip("Either run this test as root or set sysctl(3) "
1383 "security.models.extensions.user_set_dbregs to 1");
1384 }
1385
1386 dr7.raw = 0;
1387 dr7.bits.global_dr2_breakpoint = 1;
1388 dr7.bits.condition_dr2 = 0; /* 0b00 -- break on code execution */
1389 dr7.bits.len_dr2 = 0; /* 0b00 -- 1 byte */
1390
1391 DPRINTF("Before forking process PID=%d\n", getpid());
1392 SYSCALL_REQUIRE((child = fork()) != -1);
1393 if (child == 0) {
1394 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1395 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1396
1397 DPRINTF("Before raising %s from child\n", strsignal(sigval));
1398 FORKEE_ASSERT(raise(sigval) == 0);
1399
1400 printf("check_happy(%d)=%d\n", watchme, check_happy(watchme));
1401
1402 DPRINTF("Before raising %s from child\n", strsignal(sigval));
1403 FORKEE_ASSERT(raise(sigval) == 0);
1404
1405 DPRINTF("Before exiting of the child process\n");
1406 _exit(exitval);
1407 }
1408 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1409
1410 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1411 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1412
1413 validate_status_stopped(status, sigval);
1414
1415 DPRINTF("Call GETDBREGS for the child process (r1)\n");
1416 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1417
1418 DPRINTF("State of the debug registers (r1):\n");
1419 for (i = 0; i < __arraycount(r1.dr); i++)
1420 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1421
1422 r1.dr[2] = (long)(intptr_t)check_happy;
1423 DPRINTF("Set DR2 (r1.dr[2]) to new value %" PRIxREGISTER "\n",
1424 r1.dr[2]);
1425
1426 r1.dr[7] = dr7.raw;
1427 DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1428 r1.dr[7]);
1429
1430 DPRINTF("New state of the debug registers (r1):\n");
1431 for (i = 0; i < __arraycount(r1.dr); i++)
1432 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1433
1434 DPRINTF("Call SETDBREGS for the child process (r1)\n");
1435 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1436
1437 DPRINTF("Call CONTINUE for the child process\n");
1438 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1439
1440 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1441 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1442
1443 validate_status_stopped(status, SIGTRAP);
1444
1445 DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
1446 SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
1447
1448 DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
1449 DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
1450 info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
1451 info.psi_siginfo.si_errno);
1452
1453 DPRINTF("Before checking siginfo_t\n");
1454 ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, SIGTRAP);
1455 ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_DBREG);
1456
1457 DPRINTF("Remove code trap from check_happy=%p\n", check_happy);
1458 dr7.bits.global_dr2_breakpoint = 0;
1459 r1.dr[7] = dr7.raw;
1460 DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1461 r1.dr[7]);
1462
1463 DPRINTF("Call SETDBREGS for the child process (r1)\n");
1464 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1465
1466 DPRINTF("Call CONTINUE for the child process\n");
1467 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1468
1469 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1470 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1471
1472 validate_status_stopped(status, sigval);
1473
1474 DPRINTF("Before resuming the child process where it left off and "
1475 "without signal to be sent\n");
1476 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1477
1478 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1479 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1480
1481 validate_status_exited(status, exitval);
1482
1483 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1484 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1485 }
1486 #endif
1487
1488 #if defined(HAVE_DBREGS)
1489 ATF_TC(dbregs_dr3_trap_code);
1490 ATF_TC_HEAD(dbregs_dr3_trap_code, tc)
1491 {
1492 atf_tc_set_md_var(tc, "descr",
1493 "Verify that setting trap with DR3 triggers SIGTRAP "
1494 "(break on code execution trap)");
1495 }
1496
1497 ATF_TC_BODY(dbregs_dr3_trap_code, tc)
1498 {
1499 const int exitval = 5;
1500 const int sigval = SIGSTOP;
1501 pid_t child, wpid;
1502 #if defined(TWAIT_HAVE_STATUS)
1503 int status;
1504 #endif
1505 struct dbreg r1;
1506 size_t i;
1507 volatile int watchme = 1;
1508 union u dr7;
1509
1510 struct ptrace_siginfo info;
1511 memset(&info, 0, sizeof(info));
1512
1513 if (!can_we_set_dbregs()) {
1514 atf_tc_skip("Either run this test as root or set sysctl(3) "
1515 "security.models.extensions.user_set_dbregs to 1");
1516 }
1517
1518 dr7.raw = 0;
1519 dr7.bits.global_dr3_breakpoint = 1;
1520 dr7.bits.condition_dr3 = 0; /* 0b00 -- break on code execution */
1521 dr7.bits.len_dr3 = 0; /* 0b00 -- 1 byte */
1522
1523 DPRINTF("Before forking process PID=%d\n", getpid());
1524 SYSCALL_REQUIRE((child = fork()) != -1);
1525 if (child == 0) {
1526 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1527 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1528
1529 DPRINTF("Before raising %s from child\n", strsignal(sigval));
1530 FORKEE_ASSERT(raise(sigval) == 0);
1531
1532 printf("check_happy(%d)=%d\n", watchme, check_happy(watchme));
1533
1534 DPRINTF("Before raising %s from child\n", strsignal(sigval));
1535 FORKEE_ASSERT(raise(sigval) == 0);
1536
1537 DPRINTF("Before exiting of the child process\n");
1538 _exit(exitval);
1539 }
1540 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1541
1542 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1543 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1544
1545 validate_status_stopped(status, sigval);
1546
1547 DPRINTF("Call GETDBREGS for the child process (r1)\n");
1548 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1549
1550 DPRINTF("State of the debug registers (r1):\n");
1551 for (i = 0; i < __arraycount(r1.dr); i++)
1552 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1553
1554 r1.dr[3] = (long)(intptr_t)check_happy;
1555 DPRINTF("Set DR3 (r1.dr[3]) to new value %" PRIxREGISTER "\n",
1556 r1.dr[3]);
1557
1558 r1.dr[7] = dr7.raw;
1559 DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1560 r1.dr[7]);
1561
1562 DPRINTF("New state of the debug registers (r1):\n");
1563 for (i = 0; i < __arraycount(r1.dr); i++)
1564 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1565
1566 DPRINTF("Call SETDBREGS for the child process (r1)\n");
1567 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1568
1569 DPRINTF("Call CONTINUE for the child process\n");
1570 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1571
1572 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1573 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1574
1575 validate_status_stopped(status, SIGTRAP);
1576
1577 DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
1578 SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
1579
1580 DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
1581 DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
1582 info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
1583 info.psi_siginfo.si_errno);
1584
1585 DPRINTF("Before checking siginfo_t\n");
1586 ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, SIGTRAP);
1587 ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_DBREG);
1588
1589 DPRINTF("Remove code trap from check_happy=%p\n", check_happy);
1590 dr7.bits.global_dr3_breakpoint = 0;
1591 r1.dr[7] = dr7.raw;
1592 DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1593 r1.dr[7]);
1594
1595 DPRINTF("Call SETDBREGS for the child process (r1)\n");
1596 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1597
1598 DPRINTF("Call CONTINUE for the child process\n");
1599 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1600
1601 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1602 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1603
1604 validate_status_stopped(status, sigval);
1605
1606 DPRINTF("Before resuming the child process where it left off and "
1607 "without signal to be sent\n");
1608 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1609
1610 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1611 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1612
1613 validate_status_exited(status, exitval);
1614
1615 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1616 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1617 }
1618 #endif
1619
1620 volatile lwpid_t x86_the_lwp_id = 0;
1621
1622 static void __used
1623 x86_lwp_main_func(void *arg)
1624 {
1625 x86_the_lwp_id = _lwp_self();
1626 _lwp_exit();
1627 }
1628
1629 static void
1630 dbregs_dont_inherit_lwp(int reg)
1631 {
1632 const int exitval = 5;
1633 const int sigval = SIGSTOP;
1634 pid_t child, wpid;
1635 #if defined(TWAIT_HAVE_STATUS)
1636 int status;
1637 #endif
1638 ptrace_state_t state;
1639 const int slen = sizeof(state);
1640 ptrace_event_t event;
1641 const int elen = sizeof(event);
1642 ucontext_t uc;
1643 lwpid_t lid;
1644 static const size_t ssize = 16*1024;
1645 void *stack;
1646 size_t i;
1647 struct dbreg r1;
1648 struct dbreg r2;
1649
1650 if (!can_we_set_dbregs()) {
1651 atf_tc_skip("Either run this test as root or set sysctl(3) "
1652 "security.models.extensions.user_set_dbregs to 1");
1653 }
1654
1655 DPRINTF("Before forking process PID=%d\n", getpid());
1656 SYSCALL_REQUIRE((child = fork()) != -1);
1657 if (child == 0) {
1658 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1659 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1660
1661 DPRINTF("Before raising %s from child\n", strsignal(sigval));
1662 FORKEE_ASSERT(raise(sigval) == 0);
1663
1664 DPRINTF("Before allocating memory for stack in child\n");
1665 FORKEE_ASSERT((stack = malloc(ssize)) != NULL);
1666
1667 DPRINTF("Before making context for new lwp in child\n");
1668 _lwp_makecontext(&uc, x86_lwp_main_func, NULL, NULL, stack,
1669 ssize);
1670
1671 DPRINTF("Before creating new in child\n");
1672 FORKEE_ASSERT(_lwp_create(&uc, 0, &lid) == 0);
1673
1674 DPRINTF("Before waiting for lwp %d to exit\n", lid);
1675 FORKEE_ASSERT(_lwp_wait(lid, NULL) == 0);
1676
1677 DPRINTF("Before verifying that reported %d and running lid %d "
1678 "are the same\n", lid, x86_the_lwp_id);
1679 FORKEE_ASSERT_EQ(lid, x86_the_lwp_id);
1680
1681 DPRINTF("Before exiting of the child process\n");
1682 _exit(exitval);
1683 }
1684 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1685
1686 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1687 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1688
1689 validate_status_stopped(status, sigval);
1690
1691 DPRINTF("Set empty EVENT_MASK for the child %d\n", child);
1692 event.pe_set_event = PTRACE_LWP_CREATE;
1693 SYSCALL_REQUIRE(ptrace(PT_SET_EVENT_MASK, child, &event, elen) != -1);
1694
1695 DPRINTF("Call GETDBREGS for the child process (r1)\n");
1696 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1697
1698 DPRINTF("State of the debug registers (r1):\n");
1699 for (i = 0; i < __arraycount(r1.dr); i++)
1700 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1701
1702 r1.dr[reg] = (long)(intptr_t)check_happy;
1703 DPRINTF("Set DR%d (r1.dr[%d]) to new value %" PRIxREGISTER "\n",
1704 reg, reg, r1.dr[0]);
1705
1706 DPRINTF("New state of the debug registers (r1):\n");
1707 for (i = 0; i < __arraycount(r1.dr); i++)
1708 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1709
1710 DPRINTF("Call SETDBREGS for the child process (r1)\n");
1711 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1712
1713 DPRINTF("Before resuming the child process where it left off and "
1714 "without signal to be sent\n");
1715 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1716
1717 DPRINTF("Before calling %s() for the child - expected stopped "
1718 "SIGTRAP\n", TWAIT_FNAME);
1719 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1720
1721 validate_status_stopped(status, SIGTRAP);
1722
1723 SYSCALL_REQUIRE(ptrace(PT_GET_PROCESS_STATE, child, &state, slen) != -1);
1724
1725 ATF_REQUIRE_EQ(state.pe_report_event, PTRACE_LWP_CREATE);
1726
1727 lid = state.pe_lwp;
1728 DPRINTF("Reported PTRACE_LWP_CREATE event with lid %d\n", lid);
1729
1730 DPRINTF("Call GETDBREGS for the child process new lwp (r2)\n");
1731 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r2, lid) != -1);
1732
1733 DPRINTF("State of the debug registers (r2):\n");
1734 for (i = 0; i < __arraycount(r2.dr); i++)
1735 DPRINTF("r2[%zu]=%" PRIxREGISTER "\n", i, r2.dr[i]);
1736
1737 DPRINTF("Assert that (r1) and (r2) are not the same\n");
1738 ATF_REQUIRE(memcmp(&r1, &r2, sizeof(r1)) != 0);
1739
1740 DPRINTF("Before resuming the child process where it left off and "
1741 "without signal to be sent\n");
1742 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1743
1744 DPRINTF("Before calling %s() for the child - expected exited\n",
1745 TWAIT_FNAME);
1746 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1747
1748 validate_status_exited(status, exitval);
1749
1750 DPRINTF("Before calling %s() for the child - expected no process\n",
1751 TWAIT_FNAME);
1752 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1753 }
1754
1755 ATF_TC(dbregs_dr0_dont_inherit_lwp);
1756 ATF_TC_HEAD(dbregs_dr0_dont_inherit_lwp, tc)
1757 {
1758 atf_tc_set_md_var(tc, "descr",
1759 "Verify that 1 LWP creation is intercepted by ptrace(2) with "
1760 "EVENT_MASK set to PTRACE_LWP_CREATE and Debug Register 0 from "
1761 "the forker thread is not inherited");
1762 }
1763
1764 ATF_TC_BODY(dbregs_dr0_dont_inherit_lwp, tc)
1765 {
1766 dbregs_dont_inherit_lwp(0);
1767 }
1768
1769 ATF_TC(dbregs_dr1_dont_inherit_lwp);
1770 ATF_TC_HEAD(dbregs_dr1_dont_inherit_lwp, tc)
1771 {
1772 atf_tc_set_md_var(tc, "descr",
1773 "Verify that 1 LWP creation is intercepted by ptrace(2) with "
1774 "EVENT_MASK set to PTRACE_LWP_CREATE and Debug Register 1 from "
1775 "the forker thread is not inherited");
1776 }
1777
1778 ATF_TC_BODY(dbregs_dr1_dont_inherit_lwp, tc)
1779 {
1780 dbregs_dont_inherit_lwp(1);
1781 }
1782
1783 ATF_TC(dbregs_dr2_dont_inherit_lwp);
1784 ATF_TC_HEAD(dbregs_dr2_dont_inherit_lwp, tc)
1785 {
1786 atf_tc_set_md_var(tc, "descr",
1787 "Verify that 1 LWP creation is intercepted by ptrace(2) with "
1788 "EVENT_MASK set to PTRACE_LWP_CREATE and Debug Register 2 from "
1789 "the forker thread is not inherited");
1790 }
1791
1792 ATF_TC_BODY(dbregs_dr2_dont_inherit_lwp, tc)
1793 {
1794 dbregs_dont_inherit_lwp(2);
1795 }
1796
1797 ATF_TC(dbregs_dr3_dont_inherit_lwp);
1798 ATF_TC_HEAD(dbregs_dr3_dont_inherit_lwp, tc)
1799 {
1800 atf_tc_set_md_var(tc, "descr",
1801 "Verify that 1 LWP creation is intercepted by ptrace(2) with "
1802 "EVENT_MASK set to PTRACE_LWP_CREATE and Debug Register 3 from "
1803 "the forker thread is not inherited");
1804 }
1805
1806 ATF_TC_BODY(dbregs_dr3_dont_inherit_lwp, tc)
1807 {
1808 dbregs_dont_inherit_lwp(3);
1809 }
1810
1811 static void
1812 dbregs_dont_inherit_execve(int reg)
1813 {
1814 const int sigval = SIGTRAP;
1815 pid_t child, wpid;
1816 #if defined(TWAIT_HAVE_STATUS)
1817 int status;
1818 #endif
1819 size_t i;
1820 struct dbreg r1;
1821 struct dbreg r2;
1822
1823 struct ptrace_siginfo info;
1824 memset(&info, 0, sizeof(info));
1825
1826 if (!can_we_set_dbregs()) {
1827 atf_tc_skip("Either run this test as root or set sysctl(3) "
1828 "security.models.extensions.user_set_dbregs to 1");
1829 }
1830
1831 DPRINTF("Before forking process PID=%d\n", getpid());
1832 SYSCALL_REQUIRE((child = fork()) != -1);
1833 if (child == 0) {
1834 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1835 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1836
1837 DPRINTF("Before raising %s from child\n", strsignal(sigval));
1838 FORKEE_ASSERT(raise(sigval) == 0);
1839
1840 DPRINTF("Before calling execve(2) from child\n");
1841 execlp("/bin/echo", "/bin/echo", NULL);
1842
1843 FORKEE_ASSERT(0 && "Not reached");
1844 }
1845 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1846
1847 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1848 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1849
1850 validate_status_stopped(status, sigval);
1851
1852 DPRINTF("Call GETDBREGS for the child process (r1)\n");
1853 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1854
1855 DPRINTF("State of the debug registers (r1):\n");
1856 for (i = 0; i < __arraycount(r1.dr); i++)
1857 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1858
1859 r1.dr[reg] = (long)(intptr_t)check_happy;
1860 DPRINTF("Set DR%d (r1.dr[%d]) to new value %" PRIxREGISTER "\n",
1861 reg, reg, r1.dr[reg]);
1862
1863 DPRINTF("New state of the debug registers (r1):\n");
1864 for (i = 0; i < __arraycount(r1.dr); i++)
1865 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1866
1867 DPRINTF("Call SETDBREGS for the child process (r1)\n");
1868 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1869
1870 DPRINTF("Before resuming the child process where it left off and "
1871 "without signal to be sent\n");
1872 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1873
1874 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1875 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1876
1877 validate_status_stopped(status, sigval);
1878
1879 DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
1880 SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
1881
1882 DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
1883 DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
1884 info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
1885 info.psi_siginfo.si_errno);
1886
1887 ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, sigval);
1888 ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_EXEC);
1889
1890 DPRINTF("Call GETDBREGS for the child process after execve(2)\n");
1891 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r2, 0) != -1);
1892
1893 DPRINTF("State of the debug registers (r2):\n");
1894 for (i = 0; i < __arraycount(r2.dr); i++)
1895 DPRINTF("r2[%zu]=%" PRIxREGISTER "\n", i, r2.dr[i]);
1896
1897 DPRINTF("Assert that (r1) and (r2) are not the same\n");
1898 ATF_REQUIRE(memcmp(&r1, &r2, sizeof(r1)) != 0);
1899
1900 DPRINTF("Before resuming the child process where it left off and "
1901 "without signal to be sent\n");
1902 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1903
1904 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1905 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1906
1907 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1908 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1909 }
1910
1911 ATF_TC(dbregs_dr0_dont_inherit_execve);
1912 ATF_TC_HEAD(dbregs_dr0_dont_inherit_execve, tc)
1913 {
1914 atf_tc_set_md_var(tc, "descr",
1915 "Verify that execve(2) is intercepted by tracer and Debug "
1916 "Register 0 is reset");
1917 }
1918
1919 ATF_TC_BODY(dbregs_dr0_dont_inherit_execve, tc)
1920 {
1921 dbregs_dont_inherit_execve(0);
1922 }
1923
1924 ATF_TC(dbregs_dr1_dont_inherit_execve);
1925 ATF_TC_HEAD(dbregs_dr1_dont_inherit_execve, tc)
1926 {
1927 atf_tc_set_md_var(tc, "descr",
1928 "Verify that execve(2) is intercepted by tracer and Debug "
1929 "Register 1 is reset");
1930 }
1931
1932 ATF_TC_BODY(dbregs_dr1_dont_inherit_execve, tc)
1933 {
1934 dbregs_dont_inherit_execve(1);
1935 }
1936
1937 ATF_TC(dbregs_dr2_dont_inherit_execve);
1938 ATF_TC_HEAD(dbregs_dr2_dont_inherit_execve, tc)
1939 {
1940 atf_tc_set_md_var(tc, "descr",
1941 "Verify that execve(2) is intercepted by tracer and Debug "
1942 "Register 2 is reset");
1943 }
1944
1945 ATF_TC_BODY(dbregs_dr2_dont_inherit_execve, tc)
1946 {
1947 dbregs_dont_inherit_execve(2);
1948 }
1949
1950 ATF_TC(dbregs_dr3_dont_inherit_execve);
1951 ATF_TC_HEAD(dbregs_dr3_dont_inherit_execve, tc)
1952 {
1953 atf_tc_set_md_var(tc, "descr",
1954 "Verify that execve(2) is intercepted by tracer and Debug "
1955 "Register 3 is reset");
1956 }
1957
1958 ATF_TC_BODY(dbregs_dr3_dont_inherit_execve, tc)
1959 {
1960 dbregs_dont_inherit_execve(3);
1961 }
1962
1963 /// ----------------------------------------------------------------------------
1964
1965 ATF_TC(x86_cve_2018_8897);
1966 ATF_TC_HEAD(x86_cve_2018_8897, tc)
1967 {
1968 atf_tc_set_md_var(tc, "descr",
1969 "Verify mitigation for CVE-2018-8897 (POP SS debug exception)");
1970 }
1971
1972 #define X86_CVE_2018_8897_PAGE 0x5000 /* page addressable by 32-bit registers */
1973
1974 static void
1975 x86_cve_2018_8897_trigger(void)
1976 {
1977 /*
1978 * A function to trigger the POP SS (CVE-2018-8897) vulnerability
1979 *
1980 * ifdef __x86_64__
1981 *
1982 * We need to switch to 32-bit mode execution on 64-bit kernel.
1983 * This is achieved with far jump instruction and GDT descriptor
1984 * set to 32-bit CS selector. The 32-bit CS selector is kernel
1985 * specific, in the NetBSD case registered as GUCODE32_SEL
1986 * that is equal to (14 (decimal) << 3) with GDT and user
1987 * privilege level (this makes it 0x73).
1988 *
1989 * In UNIX as(1) assembly x86_64 far jump is coded as ljmp.
1990 * amd64 ljmp requires an indirect address with cs:RIP.
1991 *
1992 * When we are running in 32-bit mode, it's similar to the
1993 * mode as if the binary had been launched in netbsd32.
1994 *
1995 * There are two versions of this exploit, one with RIP
1996 * relative code and the other with static addresses.
1997 * The first one is PIE code aware, the other no-PIE one.
1998 *
1999 *
2000 * After switching to the 32-bit mode we can move on to the remaining
2001 * part of the exploit.
2002 *
2003 * endif // __x86_64__
2004 *
2005 * Set the stack pointer to the page we allocated earlier. Remember
2006 * that we put an SS selector exactly at this address, so we can pop.
2007 *
2008 * movl $0x5000,%esp
2009 *
2010 * Pop the SS selector off the stack. This reloads the SS selector,
2011 * which is fine. Remember that we set DR0 at address 0x5000, which
2012 * we are now reading. Therefore, on this instruction, the CPU will
2013 * raise a #DB exception.
2014 *
2015 * But the "pop %ss" instruction is special: it blocks exceptions
2016 * until the next instruction is executed. So the #DB that we just
2017 * raised is actually blocked.
2018 *
2019 * pop %ss
2020 *
2021 * We are still here, and didn't receive the #DB. After we execute
2022 * this instruction, the effect of "pop %ss" will disappear, and
2023 * we will receive the #DB for real.
2024 *
2025 * int $4
2026 *
2027 * Here the bug happens. We executed "int $4", so we entered the
2028 * kernel, with interrupts disabled. The #DB that was pending is
2029 * received. But, it is received immediately in kernel mode, and is
2030 * _NOT_ received when interrupts are enabled again.
2031 *
2032 * It means that, in the first instruction of the $4 handler, we
2033 * think we are safe with interrupts disabled. But we aren't, and
2034 * just got interrupted.
2035 *
2036 * The new interrupt handler doesn't handle this particular context:
2037 * we are entered in kernel mode, the previous context was kernel
2038 * mode too but it still had the user context loaded.
2039 *
2040 * We find ourselves not doing a 'swapgs'. At the end of the day, it
2041 * means that we call trap() with a curcpu() that is fully
2042 * controllable by userland. From then on, it is easy to escalate
2043 * privileges.
2044 *
2045 * With SVS it also means we don't switch CR3, so this results in a
2046 * triple fault, which this time cannot be turned to a privilege
2047 * escalation.
2048 */
2049
2050 #if __x86_64__
2051 #if __PIE__
2052 void *csRIP;
2053
2054 csRIP = malloc(sizeof(int) + sizeof(short));
2055 FORKEE_ASSERT(csRIP != NULL);
2056
2057 __asm__ __volatile__(
2058 " leal 24(%%eip), %%eax\n\t"
2059 " movq %0, %%rdx\n\t"
2060 " movl %%eax, (%%rdx)\n\t"
2061 " movw $0x73, 4(%%rdx)\n\t"
2062 " movq %1, %%rax\n\t"
2063 " ljmp *(%%rax)\n\t"
2064 " .code32\n\t"
2065 " movl $0x5000, %%esp\n\t"
2066 " pop %%ss\n\t"
2067 " int $4\n\t"
2068 " .code64\n\t"
2069 : "=m"(csRIP)
2070 : "m"(csRIP)
2071 : "%rax", "%rdx", "%rsp"
2072 );
2073 #else /* !__PIE__ */
2074 __asm__ __volatile__(
2075 " movq $farjmp32%=, %%rax\n\t"
2076 " ljmp *(%%rax)\n\t"
2077 "farjmp32%=:\n\t"
2078 " .long trigger32%=\n\t"
2079 " .word 0x73\n\t"
2080 " .code32\n\t"
2081 "trigger32%=:\n\t"
2082 " movl $0x5000, %%esp\n\t"
2083 " pop %%ss\n\t"
2084 " int $4\n\t"
2085 " .code64\n\t"
2086 :
2087 :
2088 : "%rax", "%rsp"
2089 );
2090 #endif
2091 #elif __i386__
2092 __asm__ __volatile__(
2093 "movl $0x5000, %%esp\n\t"
2094 "pop %%ss\n\t"
2095 "int $4\n\t"
2096 :
2097 :
2098 : "%esp"
2099 );
2100 #endif
2101 }
2102
2103 ATF_TC_BODY(x86_cve_2018_8897, tc)
2104 {
2105 const int sigval = SIGSTOP;
2106 pid_t child, wpid;
2107 #if defined(TWAIT_HAVE_STATUS)
2108 int status;
2109 #endif
2110 char *trap_page;
2111 struct dbreg db;
2112
2113
2114 if (!can_we_set_dbregs()) {
2115 atf_tc_skip("Either run this test as root or set sysctl(3) "
2116 "security.models.extensions.user_set_dbregs to 1");
2117 }
2118
2119 DPRINTF("Before forking process PID=%d\n", getpid());
2120 SYSCALL_REQUIRE((child = fork()) != -1);
2121 if (child == 0) {
2122 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
2123 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
2124
2125 trap_page = mmap((void *)X86_CVE_2018_8897_PAGE,
2126 sysconf(_SC_PAGESIZE), PROT_READ|PROT_WRITE,
2127 MAP_FIXED|MAP_ANON|MAP_PRIVATE, -1, 0);
2128
2129 /* trigger page fault */
2130 memset(trap_page, 0, sysconf(_SC_PAGESIZE));
2131
2132 // kernel GDT
2133 #if __x86_64__
2134 /* SS selector (descriptor 9 (0x4f >> 3)) */
2135 *trap_page = 0x4f;
2136 #elif __i386__
2137 /* SS selector (descriptor 4 (0x23 >> 3)) */
2138 *trap_page = 0x23;
2139 #endif
2140
2141 DPRINTF("Before raising %s from child\n", strsignal(sigval));
2142 FORKEE_ASSERT(raise(sigval) == 0);
2143
2144 x86_cve_2018_8897_trigger();
2145
2146 /* NOTREACHED */
2147 FORKEE_ASSERTX(0 && "This shall not be reached");
2148 }
2149 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
2150
2151 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2152 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2153
2154 validate_status_stopped(status, sigval);
2155
2156 DPRINTF("Call GETDBREGS for the child process\n");
2157 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &db, 0) != -1);
2158
2159 /*
2160 * Set up the dbregs. We put the 0x5000 address in DR0.
2161 * It means that, the first time we touch this, the CPU will trigger a
2162 * #DB exception.
2163 */
2164 db.dr[0] = X86_CVE_2018_8897_PAGE;
2165 db.dr[7] = 0x30003;
2166
2167 DPRINTF("Call SETDBREGS for the child process\n");
2168 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &db, 0) != -1);
2169
2170 DPRINTF("Before resuming the child process where it left off and "
2171 "without signal to be sent\n");
2172 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
2173
2174 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2175 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2176
2177 // In this test we receive SIGFPE, is this appropriate?
2178 // validate_status_stopped(status, SIGFPE);
2179
2180 DPRINTF("Kill the child process\n");
2181 SYSCALL_REQUIRE(ptrace(PT_KILL, child, NULL, 0) != -1);
2182
2183 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2184 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2185
2186 validate_status_signaled(status, SIGKILL, 0);
2187
2188 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2189 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
2190 }
2191
2192 /// ----------------------------------------------------------------------------
2193
2194 union x86_test_register {
2195 struct {
2196 uint64_t a, b, c, d;
2197 } ymm;
2198 struct {
2199 uint64_t a, b;
2200 } xmm;
2201 uint64_t u64;
2202 uint32_t u32;
2203 };
2204
2205 enum x86_test_regset {
2206 TEST_GPREGS,
2207 TEST_FPREGS,
2208 TEST_XMMREGS,
2209 TEST_XSTATE
2210 };
2211
2212 /* Please keep them grouped by acceptable x86_test_regset. */
2213 enum x86_test_registers {
2214 /* TEST_GPREGS */
2215 GPREGS_32,
2216 GPREGS_32_EBP_ESP,
2217 GPREGS_64,
2218 GPREGS_64_R8,
2219 /* TEST_FPREGS/TEST_XMMREGS */
2220 FPREGS_MM,
2221 FPREGS_XMM,
2222 /* TEST_XSTATE */
2223 FPREGS_YMM
2224 };
2225
2226 enum x86_test_regmode {
2227 TEST_GETREGS,
2228 TEST_SETREGS,
2229 TEST_COREDUMP
2230 };
2231
2232 static __inline void get_gp32_regs(union x86_test_register out[])
2233 {
2234 #if defined(__i386__)
2235 const uint32_t fill = 0x0F0F0F0F;
2236
2237 __asm__ __volatile__(
2238 /* fill registers with clobber pattern */
2239 "movl %6, %%eax\n\t"
2240 "movl %6, %%ebx\n\t"
2241 "movl %6, %%ecx\n\t"
2242 "movl %6, %%edx\n\t"
2243 "movl %6, %%esi\n\t"
2244 "movl %6, %%edi\n\t"
2245 "\n\t"
2246 "int3\n\t"
2247 : "=a"(out[0].u32), "=b"(out[1].u32), "=c"(out[2].u32),
2248 "=d"(out[3].u32), "=S"(out[4].u32), "=D"(out[5].u32)
2249 : "g"(fill)
2250 );
2251 #else
2252 __unreachable();
2253 #endif
2254 }
2255
2256 static __inline void set_gp32_regs(const union x86_test_register data[])
2257 {
2258 #if defined(__i386__)
2259 __asm__ __volatile__(
2260 "int3\n\t"
2261 :
2262 : "a"(data[0].u32), "b"(data[1].u32), "c"(data[2].u32),
2263 "d"(data[3].u32), "S"(data[4].u32), "D"(data[5].u32)
2264 :
2265 );
2266 #else
2267 __unreachable();
2268 #endif
2269 }
2270
2271 static __inline void get_gp32_ebp_esp_regs(union x86_test_register out[])
2272 {
2273 #if defined(__i386__)
2274 const uint32_t fill = 0x0F0F0F0F;
2275
2276 __asm__ __volatile__(
2277 /* save original ebp & esp using our output registers */
2278 "movl %%esp, %0\n\t"
2279 "movl %%ebp, %1\n\t"
2280 /* fill them with clobber pattern */
2281 "movl %2, %%esp\n\t"
2282 "movl %2, %%ebp\n\t"
2283 "\n\t"
2284 "int3\n\t"
2285 "\n\t"
2286 /* restore ebp & esp, and save the result */
2287 "xchgl %%esp, %0\n\t"
2288 "xchgl %%ebp, %1\n\t"
2289 : "=r"(out[0].u32), "=r"(out[1].u32)
2290 : "g"(fill)
2291 :
2292 );
2293 #else
2294 __unreachable();
2295 #endif
2296 }
2297
2298 static __inline void set_gp32_ebp_esp_regs(const union x86_test_register data[])
2299 {
2300 #if defined(__i386__)
2301 __asm__ __volatile__(
2302 /* ebp & ebp are a bit tricky, we must not clobber them */
2303 "movl %%esp, %%eax\n\t"
2304 "movl %%ebp, %%ebx\n\t"
2305 "movl %0, %%esp\n\t"
2306 "movl %1, %%ebp\n\t"
2307 "\n\t"
2308 "int3\n\t"
2309 "\n\t"
2310 "movl %%eax, %%esp\n\t"
2311 "movl %%ebx, %%ebp\n\t"
2312 :
2313 : "ri"(data[0].u32), "ri"(data[1].u32)
2314 : "%eax", "%ebx"
2315 );
2316 #else
2317 __unreachable();
2318 #endif
2319 }
2320
2321 static __inline void get_gp64_regs(union x86_test_register out[])
2322 {
2323 #if defined(__x86_64__)
2324 const uint64_t fill = 0x0F0F0F0F0F0F0F0F;
2325
2326 __asm__ __volatile__(
2327 /* save rsp & rbp */
2328 "movq %%rsp, %6\n\t"
2329 "movq %%rbp, %7\n\t"
2330 "\n\t"
2331 /* fill registers with clobber pattern */
2332 "movq %8, %%rax\n\t"
2333 "movq %8, %%rbx\n\t"
2334 "movq %8, %%rcx\n\t"
2335 "movq %8, %%rdx\n\t"
2336 "movq %8, %%rsp\n\t"
2337 "movq %8, %%rbp\n\t"
2338 "movq %8, %%rsi\n\t"
2339 "movq %8, %%rdi\n\t"
2340 "\n\t"
2341 "int3\n\t"
2342 "\n\t"
2343 /* swap saved & current rsp & rbp */
2344 "xchgq %%rsp, %6\n\t"
2345 "xchgq %%rbp, %7\n\t"
2346 : "=a"(out[0].u64), "=b"(out[1].u64), "=c"(out[2].u64),
2347 "=d"(out[3].u64), "=S"(out[4].u64), "=D"(out[5].u64),
2348 "=r"(out[6].u64), "=r"(out[7].u64)
2349 : "g"(fill)
2350 );
2351 #else
2352 __unreachable();
2353 #endif
2354 }
2355
2356 static __inline void set_gp64_regs(const union x86_test_register data[])
2357 {
2358 #if defined(__x86_64__)
2359 __asm__ __volatile__(
2360 /* rbp & rbp are a bit tricky, we must not clobber them */
2361 "movq %%rsp, %%r8\n\t"
2362 "movq %%rbp, %%r9\n\t"
2363 "movq %6, %%rsp\n\t"
2364 "movq %7, %%rbp\n\t"
2365 "\n\t"
2366 "int3\n\t"
2367 "\n\t"
2368 "movq %%r8, %%rsp\n\t"
2369 "movq %%r9, %%rbp\n\t"
2370 :
2371 : "a"(data[0].u64), "b"(data[1].u64), "c"(data[2].u64),
2372 "d"(data[3].u64), "S"(data[4].u64), "D"(data[5].u64),
2373 "r"(data[6].u64), "r"(data[7].u64)
2374 : "%r8", "%r9"
2375 );
2376 #else
2377 __unreachable();
2378 #endif
2379 }
2380
2381 static __inline void get_gp64_r8_regs(union x86_test_register out[])
2382 {
2383 #if defined(__x86_64__)
2384 const uint64_t fill = 0x0F0F0F0F0F0F0F0F;
2385
2386 __asm__ __volatile__(
2387 /* fill registers with clobber pattern */
2388 "movq %1, %%r8\n\t"
2389 "movq %1, %%r9\n\t"
2390 "movq %1, %%r10\n\t"
2391 "movq %1, %%r11\n\t"
2392 "movq %1, %%r12\n\t"
2393 "movq %1, %%r13\n\t"
2394 "movq %1, %%r14\n\t"
2395 "movq %1, %%r15\n\t"
2396 "\n\t"
2397 "int3\n\t"
2398 "\n\t"
2399 "movq %%r8, 0x00(%0)\n\t"
2400 "movq %%r9, 0x20(%0)\n\t"
2401 "movq %%r10, 0x40(%0)\n\t"
2402 "movq %%r11, 0x60(%0)\n\t"
2403 "movq %%r12, 0x80(%0)\n\t"
2404 "movq %%r13, 0xA0(%0)\n\t"
2405 "movq %%r14, 0xC0(%0)\n\t"
2406 "movq %%r15, 0xE0(%0)\n\t"
2407 :
2408 : "a"(out), "m"(fill)
2409 : "%r8", "%r9", "%r10", "%r11", "%r12", "%r13", "%r14", "%r15"
2410 );
2411 #else
2412 __unreachable();
2413 #endif
2414 }
2415
2416 static __inline void set_gp64_r8_regs(const union x86_test_register data[])
2417 {
2418 #if defined(__x86_64__)
2419 __asm__ __volatile__(
2420 "movq 0x00(%0), %%r8\n\t"
2421 "movq 0x20(%0), %%r9\n\t"
2422 "movq 0x40(%0), %%r10\n\t"
2423 "movq 0x60(%0), %%r11\n\t"
2424 "movq 0x80(%0), %%r12\n\t"
2425 "movq 0xA0(%0), %%r13\n\t"
2426 "movq 0xC0(%0), %%r14\n\t"
2427 "movq 0xE0(%0), %%r15\n\t"
2428 "int3\n\t"
2429 :
2430 : "b"(data)
2431 : "%r8", "%r9", "%r10", "%r11", "%r12", "%r13", "%r14", "%r15"
2432 );
2433 #else
2434 __unreachable();
2435 #endif
2436 }
2437
2438 __attribute__((target("mmx")))
2439 static __inline void get_mm_regs(union x86_test_register out[])
2440 {
2441 const uint64_t fill = 0x0F0F0F0F0F0F0F0F;
2442
2443 __asm__ __volatile__(
2444 /* fill registers with clobber pattern */
2445 "movq %1, %%mm0\n\t"
2446 "movq %1, %%mm1\n\t"
2447 "movq %1, %%mm2\n\t"
2448 "movq %1, %%mm3\n\t"
2449 "movq %1, %%mm4\n\t"
2450 "movq %1, %%mm5\n\t"
2451 "movq %1, %%mm6\n\t"
2452 "movq %1, %%mm7\n\t"
2453 "\n\t"
2454 "int3\n\t"
2455 "\n\t"
2456 "movq %%mm0, 0x00(%0)\n\t"
2457 "movq %%mm1, 0x20(%0)\n\t"
2458 "movq %%mm2, 0x40(%0)\n\t"
2459 "movq %%mm3, 0x60(%0)\n\t"
2460 "movq %%mm4, 0x80(%0)\n\t"
2461 "movq %%mm5, 0xA0(%0)\n\t"
2462 "movq %%mm6, 0xC0(%0)\n\t"
2463 "movq %%mm7, 0xE0(%0)\n\t"
2464 :
2465 : "a"(out), "m"(fill)
2466 : "%mm0", "%mm1", "%mm2", "%mm3", "%mm4", "%mm5", "%mm6", "%mm7"
2467 );
2468 }
2469
2470 __attribute__((target("mmx")))
2471 static __inline void set_mm_regs(const union x86_test_register data[])
2472 {
2473 __asm__ __volatile__(
2474 "movq 0x00(%0), %%mm0\n\t"
2475 "movq 0x20(%0), %%mm1\n\t"
2476 "movq 0x40(%0), %%mm2\n\t"
2477 "movq 0x60(%0), %%mm3\n\t"
2478 "movq 0x80(%0), %%mm4\n\t"
2479 "movq 0xA0(%0), %%mm5\n\t"
2480 "movq 0xC0(%0), %%mm6\n\t"
2481 "movq 0xE0(%0), %%mm7\n\t"
2482 "int3\n\t"
2483 :
2484 : "b"(data)
2485 : "%mm0", "%mm1", "%mm2", "%mm3", "%mm4", "%mm5", "%mm6", "%mm7"
2486 );
2487 }
2488
2489 __attribute__((target("sse")))
2490 static __inline void get_xmm_regs(union x86_test_register out[])
2491 {
2492 union x86_test_register fill __aligned(32) = {
2493 .xmm={ 0x0F0F0F0F0F0F0F0F, 0x0F0F0F0F0F0F0F0F }
2494 };
2495
2496 __asm__ __volatile__(
2497 /* fill registers with clobber pattern */
2498 "movaps %1, %%xmm0\n\t"
2499 "movaps %1, %%xmm1\n\t"
2500 "movaps %1, %%xmm2\n\t"
2501 "movaps %1, %%xmm3\n\t"
2502 "movaps %1, %%xmm4\n\t"
2503 "movaps %1, %%xmm5\n\t"
2504 "movaps %1, %%xmm6\n\t"
2505 "movaps %1, %%xmm7\n\t"
2506 #if defined(__x86_64__)
2507 "movaps %1, %%xmm8\n\t"
2508 "movaps %1, %%xmm9\n\t"
2509 "movaps %1, %%xmm10\n\t"
2510 "movaps %1, %%xmm11\n\t"
2511 "movaps %1, %%xmm12\n\t"
2512 "movaps %1, %%xmm13\n\t"
2513 "movaps %1, %%xmm14\n\t"
2514 "movaps %1, %%xmm15\n\t"
2515 #endif
2516 "\n\t"
2517 "int3\n\t"
2518 "\n\t"
2519 "movaps %%xmm0, 0x000(%0)\n\t"
2520 "movaps %%xmm1, 0x020(%0)\n\t"
2521 "movaps %%xmm2, 0x040(%0)\n\t"
2522 "movaps %%xmm3, 0x060(%0)\n\t"
2523 "movaps %%xmm4, 0x080(%0)\n\t"
2524 "movaps %%xmm5, 0x0A0(%0)\n\t"
2525 "movaps %%xmm6, 0x0C0(%0)\n\t"
2526 "movaps %%xmm7, 0x0E0(%0)\n\t"
2527 #if defined(__x86_64__)
2528 "movaps %%xmm8, 0x100(%0)\n\t"
2529 "movaps %%xmm9, 0x120(%0)\n\t"
2530 "movaps %%xmm10, 0x140(%0)\n\t"
2531 "movaps %%xmm11, 0x160(%0)\n\t"
2532 "movaps %%xmm12, 0x180(%0)\n\t"
2533 "movaps %%xmm13, 0x1A0(%0)\n\t"
2534 "movaps %%xmm14, 0x1C0(%0)\n\t"
2535 "movaps %%xmm15, 0x1E0(%0)\n\t"
2536 #endif
2537 :
2538 : "a"(out), "m"(fill)
2539 : "%xmm0", "%xmm1", "%xmm2", "%xmm3", "%xmm4", "%xmm5", "%xmm6", "%xmm7"
2540 #if defined(__x86_64__)
2541 , "%xmm8", "%xmm9", "%xmm10", "%xmm11", "%xmm12", "%xmm13", "%xmm14",
2542 "%xmm15"
2543 #endif
2544 );
2545 }
2546
2547 __attribute__((target("sse")))
2548 static __inline void set_xmm_regs(const union x86_test_register data[])
2549 {
2550 __asm__ __volatile__(
2551 "movaps 0x000(%0), %%xmm0\n\t"
2552 "movaps 0x020(%0), %%xmm1\n\t"
2553 "movaps 0x040(%0), %%xmm2\n\t"
2554 "movaps 0x060(%0), %%xmm3\n\t"
2555 "movaps 0x080(%0), %%xmm4\n\t"
2556 "movaps 0x0A0(%0), %%xmm5\n\t"
2557 "movaps 0x0C0(%0), %%xmm6\n\t"
2558 "movaps 0x0E0(%0), %%xmm7\n\t"
2559 #if defined(__x86_64__)
2560 "movaps 0x100(%0), %%xmm8\n\t"
2561 "movaps 0x120(%0), %%xmm9\n\t"
2562 "movaps 0x140(%0), %%xmm10\n\t"
2563 "movaps 0x160(%0), %%xmm11\n\t"
2564 "movaps 0x180(%0), %%xmm12\n\t"
2565 "movaps 0x1A0(%0), %%xmm13\n\t"
2566 "movaps 0x1C0(%0), %%xmm14\n\t"
2567 "movaps 0x1E0(%0), %%xmm15\n\t"
2568 #endif
2569 "int3\n\t"
2570 :
2571 : "b"(data)
2572 : "%xmm0", "%xmm1", "%xmm2", "%xmm3", "%xmm4", "%xmm5", "%xmm6",
2573 "%xmm7"
2574 #if defined(__x86_64__)
2575 , "%xmm8", "%xmm9", "%xmm10", "%xmm11", "%xmm12", "%xmm13",
2576 "%xmm14", "%xmm15"
2577 #endif
2578 );
2579 }
2580
2581 __attribute__((target("avx")))
2582 static __inline void get_ymm_regs(union x86_test_register out[])
2583 {
2584 union x86_test_register fill __aligned(32) = {
2585 { 0x0F0F0F0F0F0F0F0F, 0x0F0F0F0F0F0F0F0F,
2586 0x0F0F0F0F0F0F0F0F, 0x0F0F0F0F0F0F0F0F }
2587 };
2588
2589 __asm__ __volatile__(
2590 /* fill registers with clobber pattern */
2591 "vmovaps %1, %%ymm0\n\t"
2592 "vmovaps %1, %%ymm1\n\t"
2593 "vmovaps %1, %%ymm2\n\t"
2594 "vmovaps %1, %%ymm3\n\t"
2595 "vmovaps %1, %%ymm4\n\t"
2596 "vmovaps %1, %%ymm5\n\t"
2597 "vmovaps %1, %%ymm6\n\t"
2598 "vmovaps %1, %%ymm7\n\t"
2599 #if defined(__x86_64__)
2600 "vmovaps %1, %%ymm8\n\t"
2601 "vmovaps %1, %%ymm9\n\t"
2602 "vmovaps %1, %%ymm10\n\t"
2603 "vmovaps %1, %%ymm11\n\t"
2604 "vmovaps %1, %%ymm12\n\t"
2605 "vmovaps %1, %%ymm13\n\t"
2606 "vmovaps %1, %%ymm14\n\t"
2607 "vmovaps %1, %%ymm15\n\t"
2608 #endif
2609 "\n\t"
2610 "int3\n\t"
2611 "\n\t"
2612 "vmovaps %%ymm0, 0x000(%0)\n\t"
2613 "vmovaps %%ymm1, 0x020(%0)\n\t"
2614 "vmovaps %%ymm2, 0x040(%0)\n\t"
2615 "vmovaps %%ymm3, 0x060(%0)\n\t"
2616 "vmovaps %%ymm4, 0x080(%0)\n\t"
2617 "vmovaps %%ymm5, 0x0A0(%0)\n\t"
2618 "vmovaps %%ymm6, 0x0C0(%0)\n\t"
2619 "vmovaps %%ymm7, 0x0E0(%0)\n\t"
2620 #if defined(__x86_64__)
2621 "vmovaps %%ymm8, 0x100(%0)\n\t"
2622 "vmovaps %%ymm9, 0x120(%0)\n\t"
2623 "vmovaps %%ymm10, 0x140(%0)\n\t"
2624 "vmovaps %%ymm11, 0x160(%0)\n\t"
2625 "vmovaps %%ymm12, 0x180(%0)\n\t"
2626 "vmovaps %%ymm13, 0x1A0(%0)\n\t"
2627 "vmovaps %%ymm14, 0x1C0(%0)\n\t"
2628 "vmovaps %%ymm15, 0x1E0(%0)\n\t"
2629 #endif
2630 :
2631 : "a"(out), "m"(fill)
2632 : "%ymm0", "%ymm1", "%ymm2", "%ymm3", "%ymm4", "%ymm5", "%ymm6", "%ymm7"
2633 #if defined(__x86_64__)
2634 , "%ymm8", "%ymm9", "%ymm10", "%ymm11", "%ymm12", "%ymm13", "%ymm14",
2635 "%ymm15"
2636 #endif
2637 );
2638 }
2639
2640 __attribute__((target("avx")))
2641 static __inline void set_ymm_regs(const union x86_test_register data[])
2642 {
2643 __asm__ __volatile__(
2644 "vmovaps 0x000(%0), %%ymm0\n\t"
2645 "vmovaps 0x020(%0), %%ymm1\n\t"
2646 "vmovaps 0x040(%0), %%ymm2\n\t"
2647 "vmovaps 0x060(%0), %%ymm3\n\t"
2648 "vmovaps 0x080(%0), %%ymm4\n\t"
2649 "vmovaps 0x0A0(%0), %%ymm5\n\t"
2650 "vmovaps 0x0C0(%0), %%ymm6\n\t"
2651 "vmovaps 0x0E0(%0), %%ymm7\n\t"
2652 #if defined(__x86_64__)
2653 "vmovaps 0x100(%0), %%ymm8\n\t"
2654 "vmovaps 0x120(%0), %%ymm9\n\t"
2655 "vmovaps 0x140(%0), %%ymm10\n\t"
2656 "vmovaps 0x160(%0), %%ymm11\n\t"
2657 "vmovaps 0x180(%0), %%ymm12\n\t"
2658 "vmovaps 0x1A0(%0), %%ymm13\n\t"
2659 "vmovaps 0x1C0(%0), %%ymm14\n\t"
2660 "vmovaps 0x1E0(%0), %%ymm15\n\t"
2661 #endif
2662 "int3\n\t"
2663 :
2664 : "b"(data)
2665 : "%ymm0", "%ymm1", "%ymm2", "%ymm3", "%ymm4", "%ymm5", "%ymm6",
2666 "%ymm7"
2667 #if defined(__x86_64__)
2668 , "%ymm8", "%ymm9", "%ymm10", "%ymm11", "%ymm12", "%ymm13",
2669 "%ymm14", "%ymm15"
2670 #endif
2671 );
2672 }
2673
2674 static void
2675 x86_register_test(enum x86_test_regset regset, enum x86_test_registers regs,
2676 enum x86_test_regmode regmode)
2677 {
2678 const int exitval = 5;
2679 pid_t child, wpid;
2680 #if defined(TWAIT_HAVE_STATUS)
2681 const int sigval = SIGTRAP;
2682 int status;
2683 #endif
2684 struct reg gpr;
2685 struct fpreg fpr;
2686 #if defined(__i386__)
2687 struct xmmregs xmm;
2688 #endif
2689 struct xstate xst;
2690 struct iovec iov;
2691 struct fxsave* fxs = NULL;
2692 uint64_t xst_flags = 0;
2693 char core_path[] = "/tmp/core.XXXXXX";
2694 int core_fd;
2695
2696 const union x86_test_register expected[] __aligned(32) = {
2697 {{ 0x0706050403020100, 0x0F0E0D0C0B0A0908,
2698 0x1716151413121110, 0x1F1E1D1C1B1A1918, }},
2699 {{ 0x0807060504030201, 0x100F0E0D0C0B0A09,
2700 0x1817161514131211, 0x201F1E1D1C1B1A19, }},
2701 {{ 0x0908070605040302, 0x11100F0E0D0C0B0A,
2702 0x1918171615141312, 0x21201F1E1D1C1B1A, }},
2703 {{ 0x0A09080706050403, 0x1211100F0E0D0C0B,
2704 0x1A19181716151413, 0x2221201F1E1D1C1B, }},
2705 {{ 0x0B0A090807060504, 0x131211100F0E0D0C,
2706 0x1B1A191817161514, 0x232221201F1E1D1C, }},
2707 {{ 0x0C0B0A0908070605, 0x14131211100F0E0D,
2708 0x1C1B1A1918171615, 0x24232221201F1E1D, }},
2709 {{ 0x0D0C0B0A09080706, 0x1514131211100F0E,
2710 0x1D1C1B1A19181716, 0x2524232221201F1E, }},
2711 {{ 0x0E0D0C0B0A090807, 0x161514131211100F,
2712 0x1E1D1C1B1A191817, 0x262524232221201F, }},
2713 {{ 0x0F0E0D0C0B0A0908, 0x1716151413121110,
2714 0x1F1E1D1C1B1A1918, 0x2726252423222120, }},
2715 {{ 0x100F0E0D0C0B0A09, 0x1817161514131211,
2716 0x201F1E1D1C1B1A19, 0x2827262524232221, }},
2717 {{ 0x11100F0E0D0C0B0A, 0x1918171615141312,
2718 0x21201F1E1D1C1B1A, 0x2928272625242322, }},
2719 {{ 0x1211100F0E0D0C0B, 0x1A19181716151413,
2720 0x2221201F1E1D1C1B, 0x2A29282726252423, }},
2721 {{ 0x131211100F0E0D0C, 0x1B1A191817161514,
2722 0x232221201F1E1D1C, 0x2B2A292827262524, }},
2723 {{ 0x14131211100F0E0D, 0x1C1B1A1918171615,
2724 0x24232221201F1E1D, 0x2C2B2A2928272625, }},
2725 {{ 0x1514131211100F0E, 0x1D1C1B1A19181716,
2726 0x2524232221201F1E, 0x2D2C2B2A29282726, }},
2727 {{ 0x161514131211100F, 0x1E1D1C1B1A191817,
2728 0x262524232221201F, 0x2E2D2C2B2A292827, }},
2729 };
2730
2731 bool need_32 = false, need_64 = false, need_cpuid = false;
2732
2733 switch (regs) {
2734 case GPREGS_32:
2735 case GPREGS_32_EBP_ESP:
2736 need_32 = true;
2737 break;
2738 case GPREGS_64:
2739 case GPREGS_64_R8:
2740 need_64 = true;
2741 break;
2742 case FPREGS_MM:
2743 case FPREGS_XMM:
2744 case FPREGS_YMM:
2745 need_cpuid = true;
2746 break;
2747 }
2748
2749 if (need_32) {
2750 #if defined(__x86_64__)
2751 atf_tc_skip("Test requires 32-bit mode");
2752 #endif
2753 }
2754 if (need_64) {
2755 #if defined(__i386__)
2756 atf_tc_skip("Test requires 64-bit mode");
2757 #endif
2758 }
2759
2760 if (need_cpuid) {
2761 /* verify whether needed instruction sets are supported here */
2762 unsigned int eax, ebx, ecx, edx;
2763
2764 DPRINTF("Before invoking cpuid\n");
2765 if (!__get_cpuid(1, &eax, &ebx, &ecx, &edx))
2766 atf_tc_skip("CPUID is not supported by the CPU");
2767
2768 DPRINTF("cpuid: ECX = %08x, EDX = %08xd\n", ecx, edx);
2769
2770 switch (regs) {
2771 case FPREGS_YMM:
2772 if (!(ecx & bit_AVX))
2773 atf_tc_skip("AVX is not supported by the CPU");
2774 /*FALLTHROUGH*/
2775 case FPREGS_XMM:
2776 if (!(edx & bit_SSE))
2777 atf_tc_skip("SSE is not supported by the CPU");
2778 break;
2779 case FPREGS_MM:
2780 if (!(edx & bit_MMX))
2781 atf_tc_skip("MMX is not supported by the CPU");
2782 break;
2783 case GPREGS_32:
2784 case GPREGS_32_EBP_ESP:
2785 case GPREGS_64:
2786 case GPREGS_64_R8:
2787 __unreachable();
2788 }
2789 }
2790
2791 DPRINTF("Before forking process PID=%d\n", getpid());
2792 SYSCALL_REQUIRE((child = fork()) != -1);
2793 if (child == 0) {
2794 union x86_test_register vals[16] __aligned(32);
2795
2796 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
2797 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
2798
2799 DPRINTF("Before running assembly from child\n");
2800 switch (regmode) {
2801 case TEST_GETREGS:
2802 case TEST_COREDUMP:
2803 switch (regs) {
2804 case GPREGS_32:
2805 set_gp32_regs(expected);
2806 break;
2807 case GPREGS_32_EBP_ESP:
2808 set_gp32_ebp_esp_regs(expected);
2809 break;
2810 case GPREGS_64:
2811 set_gp64_regs(expected);
2812 break;
2813 case GPREGS_64_R8:
2814 set_gp64_r8_regs(expected);
2815 break;
2816 case FPREGS_MM:
2817 set_mm_regs(expected);
2818 break;
2819 case FPREGS_XMM:
2820 set_xmm_regs(expected);
2821 break;
2822 case FPREGS_YMM:
2823 set_ymm_regs(expected);
2824 break;
2825 }
2826 break;
2827 case TEST_SETREGS:
2828 switch (regs) {
2829 case GPREGS_32:
2830 get_gp32_regs(vals);
2831 break;
2832 case GPREGS_32_EBP_ESP:
2833 get_gp32_ebp_esp_regs(vals);
2834 break;
2835 case GPREGS_64:
2836 get_gp64_regs(vals);
2837 break;
2838 case GPREGS_64_R8:
2839 get_gp64_r8_regs(vals);
2840 break;
2841 case FPREGS_MM:
2842 get_mm_regs(vals);
2843 break;
2844 case FPREGS_XMM:
2845 get_xmm_regs(vals);
2846 break;
2847 case FPREGS_YMM:
2848 get_ymm_regs(vals);
2849 break;
2850 }
2851
2852 DPRINTF("Before comparing results\n");
2853 switch (regs) {
2854 case GPREGS_32:
2855 FORKEE_ASSERT(!memcmp(&vals[5].u32,
2856 &expected[5].u32, sizeof(vals->u32)));
2857 FORKEE_ASSERT(!memcmp(&vals[4].u32,
2858 &expected[4].u32, sizeof(vals->u32)));
2859 FORKEE_ASSERT(!memcmp(&vals[3].u32,
2860 &expected[3].u32, sizeof(vals->u32)));
2861 FORKEE_ASSERT(!memcmp(&vals[2].u32,
2862 &expected[2].u32, sizeof(vals->u32)));
2863 /*FALLTHROUGH*/
2864 case GPREGS_32_EBP_ESP:
2865 FORKEE_ASSERT(!memcmp(&vals[1].u32,
2866 &expected[1].u32, sizeof(vals->u32)));
2867 FORKEE_ASSERT(!memcmp(&vals[0].u32,
2868 &expected[0].u32, sizeof(vals->u32)));
2869 break;
2870 case GPREGS_64:
2871 case GPREGS_64_R8:
2872 case FPREGS_MM:
2873 FORKEE_ASSERT(!memcmp(&vals[0].u64,
2874 &expected[0].u64, sizeof(vals->u64)));
2875 FORKEE_ASSERT(!memcmp(&vals[1].u64,
2876 &expected[1].u64, sizeof(vals->u64)));
2877 FORKEE_ASSERT(!memcmp(&vals[2].u64,
2878 &expected[2].u64, sizeof(vals->u64)));
2879 FORKEE_ASSERT(!memcmp(&vals[3].u64,
2880 &expected[3].u64, sizeof(vals->u64)));
2881 FORKEE_ASSERT(!memcmp(&vals[4].u64,
2882 &expected[4].u64, sizeof(vals->u64)));
2883 FORKEE_ASSERT(!memcmp(&vals[5].u64,
2884 &expected[5].u64, sizeof(vals->u64)));
2885 FORKEE_ASSERT(!memcmp(&vals[6].u64,
2886 &expected[6].u64, sizeof(vals->u64)));
2887 FORKEE_ASSERT(!memcmp(&vals[7].u64,
2888 &expected[7].u64, sizeof(vals->u64)));
2889 break;
2890 case FPREGS_XMM:
2891 FORKEE_ASSERT(!memcmp(&vals[0].xmm,
2892 &expected[0].xmm, sizeof(vals->xmm)));
2893 FORKEE_ASSERT(!memcmp(&vals[1].xmm,
2894 &expected[1].xmm, sizeof(vals->xmm)));
2895 FORKEE_ASSERT(!memcmp(&vals[2].xmm,
2896 &expected[2].xmm, sizeof(vals->xmm)));
2897 FORKEE_ASSERT(!memcmp(&vals[3].xmm,
2898 &expected[3].xmm, sizeof(vals->xmm)));
2899 FORKEE_ASSERT(!memcmp(&vals[4].xmm,
2900 &expected[4].xmm, sizeof(vals->xmm)));
2901 FORKEE_ASSERT(!memcmp(&vals[5].xmm,
2902 &expected[5].xmm, sizeof(vals->xmm)));
2903 FORKEE_ASSERT(!memcmp(&vals[6].xmm,
2904 &expected[6].xmm, sizeof(vals->xmm)));
2905 FORKEE_ASSERT(!memcmp(&vals[7].xmm,
2906 &expected[7].xmm, sizeof(vals->xmm)));
2907 #if defined(__x86_64__)
2908 FORKEE_ASSERT(!memcmp(&vals[8].xmm,
2909 &expected[8].xmm, sizeof(vals->xmm)));
2910 FORKEE_ASSERT(!memcmp(&vals[9].xmm,
2911 &expected[9].xmm, sizeof(vals->xmm)));
2912 FORKEE_ASSERT(!memcmp(&vals[10].xmm,
2913 &expected[10].xmm, sizeof(vals->xmm)));
2914 FORKEE_ASSERT(!memcmp(&vals[11].xmm,
2915 &expected[11].xmm, sizeof(vals->xmm)));
2916 FORKEE_ASSERT(!memcmp(&vals[12].xmm,
2917 &expected[12].xmm, sizeof(vals->xmm)));
2918 FORKEE_ASSERT(!memcmp(&vals[13].xmm,
2919 &expected[13].xmm, sizeof(vals->xmm)));
2920 FORKEE_ASSERT(!memcmp(&vals[14].xmm,
2921 &expected[14].xmm, sizeof(vals->xmm)));
2922 FORKEE_ASSERT(!memcmp(&vals[15].xmm,
2923 &expected[15].xmm, sizeof(vals->xmm)));
2924 #endif
2925 break;
2926 case FPREGS_YMM:
2927 FORKEE_ASSERT(!memcmp(&vals[0].ymm,
2928 &expected[0].ymm, sizeof(vals->ymm)));
2929 FORKEE_ASSERT(!memcmp(&vals[1].ymm,
2930 &expected[1].ymm, sizeof(vals->ymm)));
2931 FORKEE_ASSERT(!memcmp(&vals[2].ymm,
2932 &expected[2].ymm, sizeof(vals->ymm)));
2933 FORKEE_ASSERT(!memcmp(&vals[3].ymm,
2934 &expected[3].ymm, sizeof(vals->ymm)));
2935 FORKEE_ASSERT(!memcmp(&vals[4].ymm,
2936 &expected[4].ymm, sizeof(vals->ymm)));
2937 FORKEE_ASSERT(!memcmp(&vals[5].ymm,
2938 &expected[5].ymm, sizeof(vals->ymm)));
2939 FORKEE_ASSERT(!memcmp(&vals[6].ymm,
2940 &expected[6].ymm, sizeof(vals->ymm)));
2941 FORKEE_ASSERT(!memcmp(&vals[7].ymm,
2942 &expected[7].ymm, sizeof(vals->ymm)));
2943 #if defined(__x86_64__)
2944 FORKEE_ASSERT(!memcmp(&vals[8].ymm,
2945 &expected[8].ymm, sizeof(vals->ymm)));
2946 FORKEE_ASSERT(!memcmp(&vals[9].ymm,
2947 &expected[9].ymm, sizeof(vals->ymm)));
2948 FORKEE_ASSERT(!memcmp(&vals[10].ymm,
2949 &expected[10].ymm, sizeof(vals->ymm)));
2950 FORKEE_ASSERT(!memcmp(&vals[11].ymm,
2951 &expected[11].ymm, sizeof(vals->ymm)));
2952 FORKEE_ASSERT(!memcmp(&vals[12].ymm,
2953 &expected[12].ymm, sizeof(vals->ymm)));
2954 FORKEE_ASSERT(!memcmp(&vals[13].ymm,
2955 &expected[13].ymm, sizeof(vals->ymm)));
2956 FORKEE_ASSERT(!memcmp(&vals[14].ymm,
2957 &expected[14].ymm, sizeof(vals->ymm)));
2958 FORKEE_ASSERT(!memcmp(&vals[15].ymm,
2959 &expected[15].ymm, sizeof(vals->ymm)));
2960 #endif
2961 break;
2962 }
2963 break;
2964 }
2965
2966 DPRINTF("Before exiting of the child process\n");
2967 _exit(exitval);
2968 }
2969 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
2970
2971 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2972 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2973
2974 validate_status_stopped(status, sigval);
2975
2976 if (regset == TEST_XSTATE) {
2977 switch (regs) {
2978 case FPREGS_MM:
2979 xst_flags |= XCR0_X87;
2980 break;
2981 case FPREGS_YMM:
2982 xst_flags |= XCR0_YMM_Hi128;
2983 /*FALLTHROUGH*/
2984 case FPREGS_XMM:
2985 xst_flags |= XCR0_SSE;
2986 break;
2987 case GPREGS_32:
2988 case GPREGS_32_EBP_ESP:
2989 case GPREGS_64:
2990 case GPREGS_64_R8:
2991 __unreachable();
2992 break;
2993 }
2994 }
2995
2996 switch (regmode) {
2997 case TEST_GETREGS:
2998 case TEST_SETREGS:
2999 switch (regset) {
3000 case TEST_GPREGS:
3001 ATF_REQUIRE(regs < FPREGS_MM);
3002 DPRINTF("Call GETREGS for the child process\n");
3003 SYSCALL_REQUIRE(ptrace(PT_GETREGS, child, &gpr, 0)
3004 != -1);
3005 break;
3006 case TEST_XMMREGS:
3007 #if defined(__i386__)
3008 ATF_REQUIRE(regs >= FPREGS_MM && regs < FPREGS_YMM);
3009 DPRINTF("Call GETXMMREGS for the child process\n");
3010 SYSCALL_REQUIRE(ptrace(PT_GETXMMREGS, child, &xmm, 0)
3011 != -1);
3012 fxs = &xmm.fxstate;
3013 break;
3014 #else
3015 /*FALLTHROUGH*/
3016 #endif
3017 case TEST_FPREGS:
3018 #if defined(__x86_64__)
3019 ATF_REQUIRE(regs >= FPREGS_MM && regs < FPREGS_YMM);
3020 fxs = &fpr.fxstate;
3021 #else
3022 ATF_REQUIRE(regs >= FPREGS_MM && regs < FPREGS_XMM);
3023 #endif
3024 DPRINTF("Call GETFPREGS for the child process\n");
3025 SYSCALL_REQUIRE(ptrace(PT_GETFPREGS, child, &fpr, 0)
3026 != -1);
3027 break;
3028 case TEST_XSTATE:
3029 ATF_REQUIRE(regs >= FPREGS_MM);
3030 iov.iov_base = &xst;
3031 iov.iov_len = sizeof(xst);
3032
3033 DPRINTF("Call GETXSTATE for the child process\n");
3034 SYSCALL_REQUIRE(ptrace(PT_GETXSTATE, child, &iov, 0)
3035 != -1);
3036
3037 ATF_REQUIRE((xst.xs_rfbm & xst_flags) == xst_flags);
3038 switch (regmode) {
3039 case TEST_SETREGS:
3040 xst.xs_rfbm = xst_flags;
3041 xst.xs_xstate_bv = xst_flags;
3042 break;
3043 case TEST_GETREGS:
3044 ATF_REQUIRE((xst.xs_xstate_bv & xst_flags)
3045 == xst_flags);
3046 break;
3047 case TEST_COREDUMP:
3048 __unreachable();
3049 break;
3050 }
3051
3052 fxs = &xst.xs_fxsave;
3053 break;
3054 }
3055 break;
3056 case TEST_COREDUMP:
3057 SYSCALL_REQUIRE((core_fd = mkstemp(core_path)) != -1);
3058 close(core_fd);
3059
3060 DPRINTF("Call DUMPCORE for the child process\n");
3061 SYSCALL_REQUIRE(ptrace(PT_DUMPCORE, child, core_path,
3062 strlen(core_path)) != -1);
3063
3064 switch (regset) {
3065 case TEST_GPREGS:
3066 ATF_REQUIRE(regs < FPREGS_MM);
3067 DPRINTF("Parse core file for PT_GETREGS\n");
3068 ATF_REQUIRE_EQ(core_find_note(core_path,
3069 "NetBSD-CORE@1", PT_GETREGS, &gpr, sizeof(gpr)),
3070 sizeof(gpr));
3071 break;
3072 case TEST_XMMREGS:
3073 #if defined(__i386__)
3074 ATF_REQUIRE(regs >= FPREGS_MM && regs < FPREGS_YMM);
3075 unlink(core_path);
3076 atf_tc_skip("XMMREGS not supported in core dumps");
3077 break;
3078 #else
3079 /*FALLTHROUGH*/
3080 #endif
3081 case TEST_FPREGS:
3082 #if defined(__x86_64__)
3083 ATF_REQUIRE(regs >= FPREGS_MM && regs < FPREGS_YMM);
3084 fxs = &fpr.fxstate;
3085 #else
3086 ATF_REQUIRE(regs >= FPREGS_MM && regs < FPREGS_XMM);
3087 #endif
3088 DPRINTF("Parse core file for PT_GETFPREGS\n");
3089 ATF_REQUIRE_EQ(core_find_note(core_path,
3090 "NetBSD-CORE@1", PT_GETFPREGS, &fpr, sizeof(fpr)),
3091 sizeof(fpr));
3092 break;
3093 case TEST_XSTATE:
3094 ATF_REQUIRE(regs >= FPREGS_MM);
3095 DPRINTF("Parse core file for PT_GETXSTATE\n");
3096 ATF_REQUIRE_EQ(core_find_note(core_path,
3097 "NetBSD-CORE@1", PT_GETXSTATE, &xst, sizeof(xst)),
3098 sizeof(xst));
3099 ATF_REQUIRE((xst.xs_xstate_bv & xst_flags)
3100 == xst_flags);
3101 fxs = &xst.xs_fxsave;
3102 break;
3103 }
3104 unlink(core_path);
3105 }
3106
3107 #if defined(__x86_64__)
3108 #define MM_REG(n) fpr.fxstate.fx_87_ac[n].r.f87_mantissa
3109 #else
3110 #define MM_REG(n) fpr.fstate.s87_ac[n].f87_mantissa
3111 #endif
3112
3113 switch (regmode) {
3114 case TEST_GETREGS:
3115 case TEST_COREDUMP:
3116 switch (regs) {
3117 case GPREGS_32:
3118 #if defined(__i386__)
3119 ATF_CHECK_EQ((uint32_t)gpr.r_eax, expected[0].u32);
3120 ATF_CHECK_EQ((uint32_t)gpr.r_ebx, expected[1].u32);
3121 ATF_CHECK_EQ((uint32_t)gpr.r_ecx, expected[2].u32);
3122 ATF_CHECK_EQ((uint32_t)gpr.r_edx, expected[3].u32);
3123 ATF_CHECK_EQ((uint32_t)gpr.r_esi, expected[4].u32);
3124 ATF_CHECK_EQ((uint32_t)gpr.r_edi, expected[5].u32);
3125 #endif
3126 break;
3127 case GPREGS_32_EBP_ESP:
3128 #if defined(__i386__)
3129 ATF_CHECK_EQ((uint32_t)gpr.r_esp, expected[0].u32);
3130 ATF_CHECK_EQ((uint32_t)gpr.r_ebp, expected[1].u32);
3131 #endif
3132 break;
3133 case GPREGS_64:
3134 #if defined(__x86_64__)
3135 ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_RAX],
3136 expected[0].u64);
3137 ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_RBX],
3138 expected[1].u64);
3139 ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_RCX],
3140 expected[2].u64);
3141 ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_RDX],
3142 expected[3].u64);
3143 ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_RSI],
3144 expected[4].u64);
3145 ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_RDI],
3146 expected[5].u64);
3147 ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_RSP],
3148 expected[6].u64);
3149 ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_RBP],
3150 expected[7].u64);
3151 #endif
3152 break;
3153 case GPREGS_64_R8:
3154 #if defined(__x86_64__)
3155 ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_R8],
3156 expected[0].u64);
3157 ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_R9],
3158 expected[1].u64);
3159 ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_R10],
3160 expected[2].u64);
3161 ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_R11],
3162 expected[3].u64);
3163 ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_R12],
3164 expected[4].u64);
3165 ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_R13],
3166 expected[5].u64);
3167 ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_R14],
3168 expected[6].u64);
3169 ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_R15],
3170 expected[7].u64);
3171 #endif
3172 break;
3173 case FPREGS_MM:
3174 if (regset == TEST_FPREGS) {
3175 ATF_CHECK_EQ(MM_REG(0), expected[0].u64);
3176 ATF_CHECK_EQ(MM_REG(1), expected[1].u64);
3177 ATF_CHECK_EQ(MM_REG(2), expected[2].u64);
3178 ATF_CHECK_EQ(MM_REG(3), expected[3].u64);
3179 ATF_CHECK_EQ(MM_REG(4), expected[4].u64);
3180 ATF_CHECK_EQ(MM_REG(5), expected[5].u64);
3181 ATF_CHECK_EQ(MM_REG(6), expected[6].u64);
3182 ATF_CHECK_EQ(MM_REG(7), expected[7].u64);
3183 } else {
3184 ATF_CHECK_EQ(fxs->fx_87_ac[0].r.f87_mantissa,
3185 expected[0].u64);
3186 ATF_CHECK_EQ(fxs->fx_87_ac[1].r.f87_mantissa,
3187 expected[1].u64);
3188 ATF_CHECK_EQ(fxs->fx_87_ac[2].r.f87_mantissa,
3189 expected[2].u64);
3190 ATF_CHECK_EQ(fxs->fx_87_ac[3].r.f87_mantissa,
3191 expected[3].u64);
3192 ATF_CHECK_EQ(fxs->fx_87_ac[4].r.f87_mantissa,
3193 expected[4].u64);
3194 ATF_CHECK_EQ(fxs->fx_87_ac[5].r.f87_mantissa,
3195 expected[5].u64);
3196 ATF_CHECK_EQ(fxs->fx_87_ac[6].r.f87_mantissa,
3197 expected[6].u64);
3198 ATF_CHECK_EQ(fxs->fx_87_ac[7].r.f87_mantissa,
3199 expected[7].u64);
3200 }
3201 break;
3202 case FPREGS_YMM:
3203 ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[0],
3204 &expected[0].ymm.c, sizeof(expected->ymm)/2));
3205 ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[1],
3206 &expected[1].ymm.c, sizeof(expected->ymm)/2));
3207 ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[2],
3208 &expected[2].ymm.c, sizeof(expected->ymm)/2));
3209 ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[3],
3210 &expected[3].ymm.c, sizeof(expected->ymm)/2));
3211 ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[4],
3212 &expected[4].ymm.c, sizeof(expected->ymm)/2));
3213 ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[5],
3214 &expected[5].ymm.c, sizeof(expected->ymm)/2));
3215 ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[6],
3216 &expected[6].ymm.c, sizeof(expected->ymm)/2));
3217 ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[7],
3218 &expected[7].ymm.c, sizeof(expected->ymm)/2));
3219 #if defined(__x86_64__)
3220 ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[8],
3221 &expected[8].ymm.c, sizeof(expected->ymm)/2));
3222 ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[9],
3223 &expected[9].ymm.c, sizeof(expected->ymm)/2));
3224 ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[10],
3225 &expected[10].ymm.c, sizeof(expected->ymm)/2));
3226 ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[11],
3227 &expected[11].ymm.c, sizeof(expected->ymm)/2));
3228 ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[12],
3229 &expected[12].ymm.c, sizeof(expected->ymm)/2));
3230 ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[13],
3231 &expected[13].ymm.c, sizeof(expected->ymm)/2));
3232 ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[14],
3233 &expected[14].ymm.c, sizeof(expected->ymm)/2));
3234 ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[15],
3235 &expected[15].ymm.c, sizeof(expected->ymm)/2));
3236 #endif
3237 /*FALLTHROUGH*/
3238 case FPREGS_XMM:
3239 ATF_CHECK(!memcmp(&fxs->fx_xmm[0], &expected[0].ymm.a,
3240 sizeof(expected->ymm)/2));
3241 ATF_CHECK(!memcmp(&fxs->fx_xmm[1], &expected[1].ymm.a,
3242 sizeof(expected->ymm)/2));
3243 ATF_CHECK(!memcmp(&fxs->fx_xmm[2], &expected[2].ymm.a,
3244 sizeof(expected->ymm)/2));
3245 ATF_CHECK(!memcmp(&fxs->fx_xmm[3], &expected[3].ymm.a,
3246 sizeof(expected->ymm)/2));
3247 ATF_CHECK(!memcmp(&fxs->fx_xmm[4], &expected[4].ymm.a,
3248 sizeof(expected->ymm)/2));
3249 ATF_CHECK(!memcmp(&fxs->fx_xmm[5], &expected[5].ymm.a,
3250 sizeof(expected->ymm)/2));
3251 ATF_CHECK(!memcmp(&fxs->fx_xmm[6], &expected[6].ymm.a,
3252 sizeof(expected->ymm)/2));
3253 ATF_CHECK(!memcmp(&fxs->fx_xmm[7], &expected[7].ymm.a,
3254 sizeof(expected->ymm)/2));
3255 #if defined(__x86_64__)
3256 ATF_CHECK(!memcmp(&fxs->fx_xmm[8], &expected[8].ymm.a,
3257 sizeof(expected->ymm)/2));
3258 ATF_CHECK(!memcmp(&fxs->fx_xmm[9], &expected[9].ymm.a,
3259 sizeof(expected->ymm)/2));
3260 ATF_CHECK(!memcmp(&fxs->fx_xmm[10], &expected[10].ymm.a,
3261 sizeof(expected->ymm)/2));
3262 ATF_CHECK(!memcmp(&fxs->fx_xmm[11], &expected[11].ymm.a,
3263 sizeof(expected->ymm)/2));
3264 ATF_CHECK(!memcmp(&fxs->fx_xmm[12], &expected[12].ymm.a,
3265 sizeof(expected->ymm)/2));
3266 ATF_CHECK(!memcmp(&fxs->fx_xmm[13], &expected[13].ymm.a,
3267 sizeof(expected->ymm)/2));
3268 ATF_CHECK(!memcmp(&fxs->fx_xmm[14], &expected[14].ymm.a,
3269 sizeof(expected->ymm)/2));
3270 ATF_CHECK(!memcmp(&fxs->fx_xmm[15], &expected[15].ymm.a,
3271 sizeof(expected->ymm)/2));
3272 #endif
3273 break;
3274 }
3275 break;
3276 case TEST_SETREGS:
3277 switch (regs) {
3278 case GPREGS_32:
3279 #if defined(__i386__)
3280 gpr.r_eax = expected[0].u32;
3281 gpr.r_ebx = expected[1].u32;
3282 gpr.r_ecx = expected[2].u32;
3283 gpr.r_edx = expected[3].u32;
3284 gpr.r_esi = expected[4].u32;
3285 gpr.r_edi = expected[5].u32;
3286 #endif
3287 break;
3288 case GPREGS_32_EBP_ESP:
3289 #if defined(__i386__)
3290 gpr.r_esp = expected[0].u32;
3291 gpr.r_ebp = expected[1].u32;
3292 #endif
3293 break;
3294 case GPREGS_64:
3295 #if defined(__x86_64__)
3296 gpr.regs[_REG_RAX] = expected[0].u64;
3297 gpr.regs[_REG_RBX] = expected[1].u64;
3298 gpr.regs[_REG_RCX] = expected[2].u64;
3299 gpr.regs[_REG_RDX] = expected[3].u64;
3300 gpr.regs[_REG_RSI] = expected[4].u64;
3301 gpr.regs[_REG_RDI] = expected[5].u64;
3302 gpr.regs[_REG_RSP] = expected[6].u64;
3303 gpr.regs[_REG_RBP] = expected[7].u64;
3304 #endif
3305 break;
3306 case GPREGS_64_R8:
3307 #if defined(__x86_64__)
3308 gpr.regs[_REG_R8] = expected[0].u64;
3309 gpr.regs[_REG_R9] = expected[1].u64;
3310 gpr.regs[_REG_R10] = expected[2].u64;
3311 gpr.regs[_REG_R11] = expected[3].u64;
3312 gpr.regs[_REG_R12] = expected[4].u64;
3313 gpr.regs[_REG_R13] = expected[5].u64;
3314 gpr.regs[_REG_R14] = expected[6].u64;
3315 gpr.regs[_REG_R15] = expected[7].u64;
3316 #endif
3317 break;
3318 case FPREGS_MM:
3319 if (regset == TEST_FPREGS) {
3320 MM_REG(0) = expected[0].u64;
3321 MM_REG(1) = expected[1].u64;
3322 MM_REG(2) = expected[2].u64;
3323 MM_REG(3) = expected[3].u64;
3324 MM_REG(4) = expected[4].u64;
3325 MM_REG(5) = expected[5].u64;
3326 MM_REG(6) = expected[6].u64;
3327 MM_REG(7) = expected[7].u64;
3328 } else {
3329 fxs->fx_87_ac[0].r.f87_mantissa =
3330 expected[0].u64;
3331 fxs->fx_87_ac[1].r.f87_mantissa =
3332 expected[1].u64;
3333 fxs->fx_87_ac[2].r.f87_mantissa =
3334 expected[2].u64;
3335 fxs->fx_87_ac[3].r.f87_mantissa =
3336 expected[3].u64;
3337 fxs->fx_87_ac[4].r.f87_mantissa =
3338 expected[4].u64;
3339 fxs->fx_87_ac[5].r.f87_mantissa =
3340 expected[5].u64;
3341 fxs->fx_87_ac[6].r.f87_mantissa =
3342 expected[6].u64;
3343 fxs->fx_87_ac[7].r.f87_mantissa =
3344 expected[7].u64;
3345 }
3346 break;
3347 case FPREGS_YMM:
3348 memcpy(&xst.xs_ymm_hi128.xs_ymm[0],
3349 &expected[0].ymm.c, sizeof(expected->ymm)/2);
3350 memcpy(&xst.xs_ymm_hi128.xs_ymm[1],
3351 &expected[1].ymm.c, sizeof(expected->ymm)/2);
3352 memcpy(&xst.xs_ymm_hi128.xs_ymm[2],
3353 &expected[2].ymm.c, sizeof(expected->ymm)/2);
3354 memcpy(&xst.xs_ymm_hi128.xs_ymm[3],
3355 &expected[3].ymm.c, sizeof(expected->ymm)/2);
3356 memcpy(&xst.xs_ymm_hi128.xs_ymm[4],
3357 &expected[4].ymm.c, sizeof(expected->ymm)/2);
3358 memcpy(&xst.xs_ymm_hi128.xs_ymm[5],
3359 &expected[5].ymm.c, sizeof(expected->ymm)/2);
3360 memcpy(&xst.xs_ymm_hi128.xs_ymm[6],
3361 &expected[6].ymm.c, sizeof(expected->ymm)/2);
3362 memcpy(&xst.xs_ymm_hi128.xs_ymm[7],
3363 &expected[7].ymm.c, sizeof(expected->ymm)/2);
3364 #if defined(__x86_64__)
3365 memcpy(&xst.xs_ymm_hi128.xs_ymm[8],
3366 &expected[8].ymm.c, sizeof(expected->ymm)/2);
3367 memcpy(&xst.xs_ymm_hi128.xs_ymm[9],
3368 &expected[9].ymm.c, sizeof(expected->ymm)/2);
3369 memcpy(&xst.xs_ymm_hi128.xs_ymm[10],
3370 &expected[10].ymm.c, sizeof(expected->ymm)/2);
3371 memcpy(&xst.xs_ymm_hi128.xs_ymm[11],
3372 &expected[11].ymm.c, sizeof(expected->ymm)/2);
3373 memcpy(&xst.xs_ymm_hi128.xs_ymm[12],
3374 &expected[12].ymm.c, sizeof(expected->ymm)/2);
3375 memcpy(&xst.xs_ymm_hi128.xs_ymm[13],
3376 &expected[13].ymm.c, sizeof(expected->ymm)/2);
3377 memcpy(&xst.xs_ymm_hi128.xs_ymm[14],
3378 &expected[14].ymm.c, sizeof(expected->ymm)/2);
3379 memcpy(&xst.xs_ymm_hi128.xs_ymm[15],
3380 &expected[15].ymm.c, sizeof(expected->ymm)/2);
3381 #endif
3382 /*FALLTHROUGH*/
3383 case FPREGS_XMM:
3384 memcpy(&fxs->fx_xmm[0], &expected[0].ymm.a,
3385 sizeof(expected->ymm)/2);
3386 memcpy(&fxs->fx_xmm[1], &expected[1].ymm.a,
3387 sizeof(expected->ymm)/2);
3388 memcpy(&fxs->fx_xmm[2], &expected[2].ymm.a,
3389 sizeof(expected->ymm)/2);
3390 memcpy(&fxs->fx_xmm[3], &expected[3].ymm.a,
3391 sizeof(expected->ymm)/2);
3392 memcpy(&fxs->fx_xmm[4], &expected[4].ymm.a,
3393 sizeof(expected->ymm)/2);
3394 memcpy(&fxs->fx_xmm[5], &expected[5].ymm.a,
3395 sizeof(expected->ymm)/2);
3396 memcpy(&fxs->fx_xmm[6], &expected[6].ymm.a,
3397 sizeof(expected->ymm)/2);
3398 memcpy(&fxs->fx_xmm[7], &expected[7].ymm.a,
3399 sizeof(expected->ymm)/2);
3400 #if defined(__x86_64__)
3401 memcpy(&fxs->fx_xmm[8], &expected[8].ymm.a,
3402 sizeof(expected->ymm)/2);
3403 memcpy(&fxs->fx_xmm[9], &expected[9].ymm.a,
3404 sizeof(expected->ymm)/2);
3405 memcpy(&fxs->fx_xmm[10], &expected[10].ymm.a,
3406 sizeof(expected->ymm)/2);
3407 memcpy(&fxs->fx_xmm[11], &expected[11].ymm.a,
3408 sizeof(expected->ymm)/2);
3409 memcpy(&fxs->fx_xmm[12], &expected[12].ymm.a,
3410 sizeof(expected->ymm)/2);
3411 memcpy(&fxs->fx_xmm[13], &expected[13].ymm.a,
3412 sizeof(expected->ymm)/2);
3413 memcpy(&fxs->fx_xmm[14], &expected[14].ymm.a,
3414 sizeof(expected->ymm)/2);
3415 memcpy(&fxs->fx_xmm[15], &expected[15].ymm.a,
3416 sizeof(expected->ymm)/2);
3417 #endif
3418 break;
3419 }
3420
3421 switch (regset) {
3422 case TEST_GPREGS:
3423 DPRINTF("Call SETREGS for the child process\n");
3424 SYSCALL_REQUIRE(ptrace(PT_SETREGS, child, &gpr, 0)
3425 != -1);
3426 break;
3427 case TEST_XMMREGS:
3428 #if defined(__i386__)
3429 DPRINTF("Call SETXMMREGS for the child process\n");
3430 SYSCALL_REQUIRE(ptrace(PT_SETXMMREGS, child, &xmm, 0)
3431 != -1);
3432 break;
3433 #else
3434 /*FALLTHROUGH*/
3435 #endif
3436 case TEST_FPREGS:
3437 DPRINTF("Call SETFPREGS for the child process\n");
3438 SYSCALL_REQUIRE(ptrace(PT_SETFPREGS, child, &fpr, 0)
3439 != -1);
3440 break;
3441 case TEST_XSTATE:
3442 DPRINTF("Call SETXSTATE for the child process\n");
3443 SYSCALL_REQUIRE(ptrace(PT_SETXSTATE, child, &iov, 0)
3444 != -1);
3445 break;
3446 }
3447 break;
3448 }
3449
3450 #undef MM_REG
3451
3452 DPRINTF("Before resuming the child process where it left off and "
3453 "without signal to be sent\n");
3454 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
3455
3456 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
3457 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
3458
3459 validate_status_exited(status, exitval);
3460
3461 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
3462 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
3463 }
3464
3465 #define X86_REGISTER_TEST(test, regset, regs, regmode, descr) \
3466 ATF_TC(test); \
3467 ATF_TC_HEAD(test, tc) \
3468 { \
3469 atf_tc_set_md_var(tc, "descr", descr); \
3470 } \
3471 \
3472 ATF_TC_BODY(test, tc) \
3473 { \
3474 x86_register_test(regset, regs, regmode); \
3475 }
3476
3477 X86_REGISTER_TEST(x86_gpregs32_read, TEST_GPREGS, GPREGS_32, TEST_GETREGS,
3478 "Test reading basic 32-bit gp registers from debugged program "
3479 "via PT_GETREGS.");
3480 X86_REGISTER_TEST(x86_gpregs32_write, TEST_GPREGS, GPREGS_32, TEST_SETREGS,
3481 "Test writing basic 32-bit gp registers into debugged program "
3482 "via PT_SETREGS.");
3483 X86_REGISTER_TEST(x86_gpregs32_core, TEST_GPREGS, GPREGS_32, TEST_COREDUMP,
3484 "Test reading basic 32-bit gp registers from core dump.");
3485 X86_REGISTER_TEST(x86_gpregs32_ebp_esp_read, TEST_GPREGS, GPREGS_32_EBP_ESP,
3486 TEST_GETREGS, "Test reading ebp & esp registers from debugged program "
3487 "via PT_GETREGS.");
3488 X86_REGISTER_TEST(x86_gpregs32_ebp_esp_write, TEST_GPREGS, GPREGS_32_EBP_ESP,
3489 TEST_SETREGS, "Test writing ebp & esp registers into debugged program "
3490 "via PT_SETREGS.");
3491 X86_REGISTER_TEST(x86_gpregs32_ebp_esp_core, TEST_GPREGS, GPREGS_32_EBP_ESP,
3492 TEST_COREDUMP, "Test reading ebp & esp registers from core dump.");
3493
3494 X86_REGISTER_TEST(x86_gpregs64_read, TEST_GPREGS, GPREGS_64, TEST_GETREGS,
3495 "Test reading basic 64-bit gp registers from debugged program "
3496 "via PT_GETREGS.");
3497 X86_REGISTER_TEST(x86_gpregs64_write, TEST_GPREGS, GPREGS_64, TEST_SETREGS,
3498 "Test writing basic 64-bit gp registers into debugged program "
3499 "via PT_SETREGS.");
3500 X86_REGISTER_TEST(x86_gpregs64_core, TEST_GPREGS, GPREGS_64, TEST_COREDUMP,
3501 "Test reading basic 64-bit gp registers from core dump.");
3502 X86_REGISTER_TEST(x86_gpregs64_r8_read, TEST_GPREGS, GPREGS_64_R8, TEST_GETREGS,
3503 "Test reading r8..r15 registers from debugged program via PT_GETREGS.");
3504 X86_REGISTER_TEST(x86_gpregs64_r8_write, TEST_GPREGS, GPREGS_64_R8,
3505 TEST_SETREGS, "Test writing r8..r15 registers into debugged program "
3506 "via PT_SETREGS.");
3507 X86_REGISTER_TEST(x86_gpregs64_r8_core, TEST_GPREGS, GPREGS_64_R8,
3508 TEST_COREDUMP, "Test reading r8..r15 registers from core dump.");
3509
3510 X86_REGISTER_TEST(x86_fpregs_mm_read, TEST_FPREGS, FPREGS_MM, TEST_GETREGS,
3511 "Test reading mm0..mm7 registers from debugged program "
3512 "via PT_GETFPREGS.");
3513 X86_REGISTER_TEST(x86_fpregs_mm_write, TEST_FPREGS, FPREGS_MM, TEST_SETREGS,
3514 "Test writing mm0..mm7 registers into debugged program "
3515 "via PT_SETFPREGS.");
3516 X86_REGISTER_TEST(x86_fpregs_mm_core, TEST_FPREGS, FPREGS_MM, TEST_COREDUMP,
3517 "Test reading mm0..mm7 registers from coredump.");
3518 X86_REGISTER_TEST(x86_fpregs_xmm_read, TEST_XMMREGS, FPREGS_XMM, TEST_GETREGS,
3519 "Test reading xmm0..xmm15 (..xmm7 on i386) from debugged program "
3520 "via PT_GETFPREGS (PT_GETXMMREGS on i386).");
3521 X86_REGISTER_TEST(x86_fpregs_xmm_write, TEST_XMMREGS, FPREGS_XMM, TEST_SETREGS,
3522 "Test writing xmm0..xmm15 (..xmm7 on i386) into debugged program "
3523 "via PT_SETFPREGS (PT_SETXMMREGS on i386).");
3524 X86_REGISTER_TEST(x86_fpregs_xmm_core, TEST_XMMREGS, FPREGS_XMM, TEST_COREDUMP,
3525 "Test reading xmm0..xmm15 (..xmm7 on i386) from coredump.");
3526
3527 X86_REGISTER_TEST(x86_xstate_mm_read, TEST_XSTATE, FPREGS_MM, TEST_GETREGS,
3528 "Test reading mm0..mm7 registers from debugged program "
3529 "via PT_GETXSTATE.");
3530 X86_REGISTER_TEST(x86_xstate_mm_write, TEST_XSTATE, FPREGS_MM, TEST_SETREGS,
3531 "Test writing mm0..mm7 registers into debugged program "
3532 "via PT_SETXSTATE.");
3533 X86_REGISTER_TEST(x86_xstate_mm_core, TEST_XSTATE, FPREGS_MM, TEST_COREDUMP,
3534 "Test reading mm0..mm7 registers from core dump via XSTATE note.");
3535 X86_REGISTER_TEST(x86_xstate_xmm_read, TEST_XSTATE, FPREGS_XMM, TEST_GETREGS,
3536 "Test reading xmm0..xmm15 (..xmm7 on i386) from debugged program "
3537 "via PT_GETXSTATE.");
3538 X86_REGISTER_TEST(x86_xstate_xmm_write, TEST_XSTATE, FPREGS_XMM, TEST_SETREGS,
3539 "Test writing xmm0..xmm15 (..xmm7 on i386) into debugged program "
3540 "via PT_SETXSTATE.");
3541 X86_REGISTER_TEST(x86_xstate_xmm_core, TEST_XSTATE, FPREGS_XMM, TEST_COREDUMP,
3542 "Test reading xmm0..xmm15 (..xmm7 on i386) from coredump via XSTATE note.");
3543 X86_REGISTER_TEST(x86_xstate_ymm_read, TEST_XSTATE, FPREGS_YMM, TEST_GETREGS,
3544 "Test reading ymm0..ymm15 (..ymm7 on i386) from debugged program "
3545 "via PT_GETXSTATE.");
3546 X86_REGISTER_TEST(x86_xstate_ymm_write, TEST_XSTATE, FPREGS_YMM, TEST_SETREGS,
3547 "Test writing ymm0..ymm15 (..ymm7 on i386) into debugged program "
3548 "via PT_SETXSTATE.");
3549 X86_REGISTER_TEST(x86_xstate_ymm_core, TEST_XSTATE, FPREGS_YMM, TEST_COREDUMP,
3550 "Test reading ymm0..ymm15 (..ymm7 on i386) from coredump via XSTATE note.");
3551
3552 /// ----------------------------------------------------------------------------
3553
3554 #if defined(TWAIT_HAVE_STATUS)
3555
3556 static void
3557 thread_concurrent_lwp_setup(pid_t child, lwpid_t lwpid)
3558 {
3559 struct dbreg r;
3560 union u dr7;
3561
3562 /* We need to set debug registers for every child */
3563 DPRINTF("Call GETDBREGS for LWP %d\n", lwpid);
3564 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r, lwpid) != -1);
3565
3566 dr7.raw = 0;
3567 /* should be set to 1 according to Intel manual, 17.2 */
3568 dr7.bits.reserved_10 = 1;
3569 dr7.bits.local_exact_breakpt = 1;
3570 dr7.bits.global_exact_breakpt = 1;
3571 /* use DR0 for breakpoints */
3572 dr7.bits.global_dr0_breakpoint = 1;
3573 dr7.bits.condition_dr0 = 0; /* exec */
3574 dr7.bits.len_dr0 = 0;
3575 /* use DR1 for watchpoints */
3576 dr7.bits.global_dr1_breakpoint = 1;
3577 dr7.bits.condition_dr1 = 1; /* write */
3578 dr7.bits.len_dr1 = 3; /* 4 bytes */
3579 r.dr[7] = dr7.raw;
3580 r.dr[0] = (long)(intptr_t)check_happy;
3581 r.dr[1] = (long)(intptr_t)&thread_concurrent_watchpoint_var;
3582 DPRINTF("dr0=%" PRIxREGISTER "\n", r.dr[0]);
3583 DPRINTF("dr1=%" PRIxREGISTER "\n", r.dr[1]);
3584 DPRINTF("dr7=%" PRIxREGISTER "\n", r.dr[7]);
3585
3586 DPRINTF("Call SETDBREGS for LWP %d\n", lwpid);
3587 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r, lwpid) != -1);
3588 }
3589
3590 static enum thread_concurrent_sigtrap_event
3591 thread_concurrent_handle_sigtrap(pid_t child, ptrace_siginfo_t *info)
3592 {
3593 enum thread_concurrent_sigtrap_event ret = TCSE_UNKNOWN;
3594 struct dbreg r;
3595 union u dr7;
3596
3597 ATF_CHECK_EQ_MSG(info->psi_siginfo.si_code, TRAP_DBREG,
3598 "lwp=%d, expected TRAP_DBREG (%d), got %d", info->psi_lwpid,
3599 TRAP_DBREG, info->psi_siginfo.si_code);
3600
3601 DPRINTF("Call GETDBREGS for LWP %d\n", info->psi_lwpid);
3602 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r, info->psi_lwpid) != -1);
3603 DPRINTF("dr6=%" PRIxREGISTER ", dr7=%" PRIxREGISTER "\n",
3604 r.dr[6], r.dr[7]);
3605
3606 ATF_CHECK_MSG(r.dr[6] & 3, "lwp=%d, got DR6=%" PRIxREGISTER,
3607 info->psi_lwpid, r.dr[6]);
3608
3609 /* Handle only one event at a time, we should get
3610 * a separate SIGTRAP for the other one.
3611 */
3612 if (r.dr[6] & 1) {
3613 r.dr[6] &= ~1;
3614
3615 /* We need to disable the breakpoint to move
3616 * past it.
3617 *
3618 * TODO: single-step and reenable it?
3619 */
3620 dr7.raw = r.dr[7];
3621 dr7.bits.global_dr0_breakpoint = 0;
3622 r.dr[7] = dr7.raw;
3623
3624 ret = TCSE_BREAKPOINT;
3625 } else if (r.dr[6] & 2) {
3626 r.dr[6] &= ~2;
3627 ret = TCSE_WATCHPOINT;
3628 }
3629
3630 DPRINTF("Call SETDBREGS for LWP %d\n", info->psi_lwpid);
3631 DPRINTF("dr6=%" PRIxREGISTER ", dr7=%" PRIxREGISTER "\n",
3632 r.dr[6], r.dr[7]);
3633 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r, info->psi_lwpid) != -1);
3634
3635 return ret;
3636 }
3637
3638 #endif /*defined(TWAIT_HAVE_STATUS)*/
3639
3640 /// ----------------------------------------------------------------------------
3641
3642 #define ATF_TP_ADD_TCS_PTRACE_WAIT_X86() \
3643 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_print); \
3644 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr0); \
3645 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr1); \
3646 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr2); \
3647 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr3); \
3648 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr0_yield); \
3649 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr1_yield); \
3650 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr2_yield); \
3651 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr3_yield); \
3652 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr0_continued); \
3653 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr1_continued); \
3654 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr2_continued); \
3655 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr3_continued); \
3656 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_writeonly_byte); \
3657 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_writeonly_byte); \
3658 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_writeonly_byte); \
3659 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_writeonly_byte); \
3660 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_writeonly_2bytes); \
3661 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_writeonly_2bytes); \
3662 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_writeonly_2bytes); \
3663 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_writeonly_2bytes); \
3664 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_writeonly_4bytes); \
3665 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_writeonly_4bytes); \
3666 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_writeonly_4bytes); \
3667 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_writeonly_4bytes); \
3668 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_write_byte); \
3669 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_write_byte); \
3670 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_write_byte); \
3671 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_write_byte); \
3672 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_write_2bytes); \
3673 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_write_2bytes); \
3674 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_write_2bytes); \
3675 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_write_2bytes); \
3676 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_write_4bytes); \
3677 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_write_4bytes); \
3678 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_write_4bytes); \
3679 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_write_4bytes); \
3680 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_read_byte); \
3681 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_read_byte); \
3682 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_read_byte); \
3683 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_read_byte); \
3684 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_read_2bytes); \
3685 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_read_2bytes); \
3686 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_read_2bytes); \
3687 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_read_2bytes); \
3688 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_read_4bytes); \
3689 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_read_4bytes); \
3690 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_read_4bytes); \
3691 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_read_4bytes); \
3692 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_code); \
3693 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_code); \
3694 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_code); \
3695 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_code); \
3696 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_dont_inherit_lwp); \
3697 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_dont_inherit_lwp); \
3698 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_dont_inherit_lwp); \
3699 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_dont_inherit_lwp); \
3700 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_dont_inherit_execve); \
3701 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_dont_inherit_execve); \
3702 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_dont_inherit_execve); \
3703 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_dont_inherit_execve); \
3704 ATF_TP_ADD_TC_HAVE_DBREGS(tp, x86_cve_2018_8897); \
3705 ATF_TP_ADD_TC(tp, x86_gpregs32_read); \
3706 ATF_TP_ADD_TC(tp, x86_gpregs32_write); \
3707 ATF_TP_ADD_TC(tp, x86_gpregs32_core); \
3708 ATF_TP_ADD_TC(tp, x86_gpregs32_ebp_esp_read); \
3709 ATF_TP_ADD_TC(tp, x86_gpregs32_ebp_esp_write); \
3710 ATF_TP_ADD_TC(tp, x86_gpregs32_ebp_esp_core); \
3711 ATF_TP_ADD_TC(tp, x86_gpregs64_read); \
3712 ATF_TP_ADD_TC(tp, x86_gpregs64_write); \
3713 ATF_TP_ADD_TC(tp, x86_gpregs64_core); \
3714 ATF_TP_ADD_TC(tp, x86_gpregs64_r8_read); \
3715 ATF_TP_ADD_TC(tp, x86_gpregs64_r8_write); \
3716 ATF_TP_ADD_TC(tp, x86_gpregs64_r8_core); \
3717 ATF_TP_ADD_TC(tp, x86_fpregs_mm_read); \
3718 ATF_TP_ADD_TC(tp, x86_fpregs_mm_write); \
3719 ATF_TP_ADD_TC(tp, x86_fpregs_mm_core); \
3720 ATF_TP_ADD_TC(tp, x86_fpregs_xmm_read); \
3721 ATF_TP_ADD_TC(tp, x86_fpregs_xmm_write); \
3722 ATF_TP_ADD_TC(tp, x86_fpregs_xmm_core); \
3723 ATF_TP_ADD_TC(tp, x86_xstate_mm_read); \
3724 ATF_TP_ADD_TC(tp, x86_xstate_mm_write); \
3725 ATF_TP_ADD_TC(tp, x86_xstate_mm_core); \
3726 ATF_TP_ADD_TC(tp, x86_xstate_xmm_read); \
3727 ATF_TP_ADD_TC(tp, x86_xstate_xmm_write); \
3728 ATF_TP_ADD_TC(tp, x86_xstate_xmm_core); \
3729 ATF_TP_ADD_TC(tp, x86_xstate_ymm_read); \
3730 ATF_TP_ADD_TC(tp, x86_xstate_ymm_write); \
3731 ATF_TP_ADD_TC(tp, x86_xstate_ymm_core);
3732 #else
3733 #define ATF_TP_ADD_TCS_PTRACE_WAIT_X86()
3734 #endif
3735