t_ptrace_x86_wait.h revision 1.7.2.1 1 /* $NetBSD: t_ptrace_x86_wait.h,v 1.7.2.1 2019/06/10 22:10:05 christos Exp $ */
2
3 /*-
4 * Copyright (c) 2016, 2017, 2018, 2019 The NetBSD Foundation, Inc.
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 *
16 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
17 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
18 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
20 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
21 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
22 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
23 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
24 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
25 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
26 * POSSIBILITY OF SUCH DAMAGE.
27 */
28
29 #if defined(__i386__) || defined(__x86_64__)
30 union u {
31 unsigned long raw;
32 struct {
33 unsigned long local_dr0_breakpoint : 1; /* 0 */
34 unsigned long global_dr0_breakpoint : 1; /* 1 */
35 unsigned long local_dr1_breakpoint : 1; /* 2 */
36 unsigned long global_dr1_breakpoint : 1; /* 3 */
37 unsigned long local_dr2_breakpoint : 1; /* 4 */
38 unsigned long global_dr2_breakpoint : 1; /* 5 */
39 unsigned long local_dr3_breakpoint : 1; /* 6 */
40 unsigned long global_dr3_breakpoint : 1; /* 7 */
41 unsigned long local_exact_breakpt : 1; /* 8 */
42 unsigned long global_exact_breakpt : 1; /* 9 */
43 unsigned long reserved_10 : 1; /* 10 */
44 unsigned long rest_trans_memory : 1; /* 11 */
45 unsigned long reserved_12 : 1; /* 12 */
46 unsigned long general_detect_enable : 1; /* 13 */
47 unsigned long reserved_14 : 1; /* 14 */
48 unsigned long reserved_15 : 1; /* 15 */
49 unsigned long condition_dr0 : 2; /* 16-17 */
50 unsigned long len_dr0 : 2; /* 18-19 */
51 unsigned long condition_dr1 : 2; /* 20-21 */
52 unsigned long len_dr1 : 2; /* 22-23 */
53 unsigned long condition_dr2 : 2; /* 24-25 */
54 unsigned long len_dr2 : 2; /* 26-27 */
55 unsigned long condition_dr3 : 2; /* 28-29 */
56 unsigned long len_dr3 : 2; /* 30-31 */
57 } bits;
58 };
59
60 ATF_TC(dbregs_print);
61 ATF_TC_HEAD(dbregs_print, tc)
62 {
63 atf_tc_set_md_var(tc, "descr",
64 "Verify plain PT_GETDBREGS with printing Debug Registers");
65 }
66
67 ATF_TC_BODY(dbregs_print, tc)
68 {
69 const int exitval = 5;
70 const int sigval = SIGSTOP;
71 pid_t child, wpid;
72 #if defined(TWAIT_HAVE_STATUS)
73 int status;
74 #endif
75 struct dbreg r;
76 size_t i;
77
78 DPRINTF("Before forking process PID=%d\n", getpid());
79 SYSCALL_REQUIRE((child = fork()) != -1);
80 if (child == 0) {
81 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
82 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
83
84 DPRINTF("Before raising %s from child\n", strsignal(sigval));
85 FORKEE_ASSERT(raise(sigval) == 0);
86
87 DPRINTF("Before exiting of the child process\n");
88 _exit(exitval);
89 }
90 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
91
92 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
93 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
94
95 validate_status_stopped(status, sigval);
96
97 DPRINTF("Call GETDBREGS for the child process\n");
98 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r, 0) != -1);
99
100 DPRINTF("State of the debug registers:\n");
101 for (i = 0; i < __arraycount(r.dr); i++)
102 DPRINTF("r[%zu]=%" PRIxREGISTER "\n", i, r.dr[i]);
103
104 DPRINTF("Before resuming the child process where it left off and "
105 "without signal to be sent\n");
106 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
107
108 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
109 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
110
111 validate_status_exited(status, exitval);
112
113 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
114 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
115 }
116
117
118 enum dbreg_preserve_mode {
119 dbreg_preserve_mode_none,
120 dbreg_preserve_mode_yield,
121 dbreg_preserve_mode_continued
122 };
123
124 static void
125 dbreg_preserve(int reg, enum dbreg_preserve_mode mode)
126 {
127 const int exitval = 5;
128 const int sigval = SIGSTOP;
129 pid_t child, wpid;
130 #if defined(TWAIT_HAVE_STATUS)
131 int status;
132 #endif
133 struct dbreg r1;
134 struct dbreg r2;
135 size_t i;
136 int watchme;
137
138 if (!can_we_set_dbregs()) {
139 atf_tc_skip("Either run this test as root or set sysctl(3) "
140 "security.models.extensions.user_set_dbregs to 1");
141 }
142
143 DPRINTF("Before forking process PID=%d\n", getpid());
144 SYSCALL_REQUIRE((child = fork()) != -1);
145 if (child == 0) {
146 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
147 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
148
149 DPRINTF("Before raising %s from child\n", strsignal(sigval));
150 FORKEE_ASSERT(raise(sigval) == 0);
151
152 if (mode == dbreg_preserve_mode_continued) {
153 DPRINTF("Before raising %s from child\n",
154 strsignal(sigval));
155 FORKEE_ASSERT(raise(sigval) == 0);
156 }
157
158 DPRINTF("Before exiting of the child process\n");
159 _exit(exitval);
160 }
161 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
162
163 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
164 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
165
166 validate_status_stopped(status, sigval);
167
168 DPRINTF("Call GETDBREGS for the child process (r1)\n");
169 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
170
171 DPRINTF("State of the debug registers (r1):\n");
172 for (i = 0; i < __arraycount(r1.dr); i++)
173 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
174
175 r1.dr[reg] = (long)(intptr_t)&watchme;
176 DPRINTF("Set DR0 (r1.dr[%d]) to new value %" PRIxREGISTER "\n",
177 reg, r1.dr[reg]);
178
179 DPRINTF("New state of the debug registers (r1):\n");
180 for (i = 0; i < __arraycount(r1.dr); i++)
181 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
182
183 DPRINTF("Call SETDBREGS for the child process (r1)\n");
184 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
185
186 switch (mode) {
187 case dbreg_preserve_mode_none:
188 break;
189 case dbreg_preserve_mode_yield:
190 DPRINTF("Yields a processor voluntarily and gives other "
191 "threads a chance to run without waiting for an "
192 "involuntary preemptive switch\n");
193 sched_yield();
194 break;
195 case dbreg_preserve_mode_continued:
196 DPRINTF("Call CONTINUE for the child process\n");
197 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
198
199 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
200 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
201
202 validate_status_stopped(status, sigval);
203 break;
204 }
205
206 DPRINTF("Call GETDBREGS for the child process (r2)\n");
207 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r2, 0) != -1);
208
209 DPRINTF("Assert that (r1) and (r2) are the same\n");
210 SYSCALL_REQUIRE(memcmp(&r1, &r2, sizeof(r1)) == 0);
211
212 DPRINTF("Before resuming the child process where it left off and "
213 "without signal to be sent\n");
214 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
215
216 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
217 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
218
219 validate_status_exited(status, exitval);
220
221 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
222 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
223 }
224
225
226 ATF_TC(dbregs_preserve_dr0);
227 ATF_TC_HEAD(dbregs_preserve_dr0, tc)
228 {
229 atf_tc_set_md_var(tc, "descr",
230 "Verify that setting DR0 is preserved across ptrace(2) calls");
231 }
232
233 ATF_TC_BODY(dbregs_preserve_dr0, tc)
234 {
235 dbreg_preserve(0, dbreg_preserve_mode_none);
236 }
237
238 ATF_TC(dbregs_preserve_dr1);
239 ATF_TC_HEAD(dbregs_preserve_dr1, tc)
240 {
241 atf_tc_set_md_var(tc, "descr",
242 "Verify that setting DR1 is preserved across ptrace(2) calls");
243 }
244
245 ATF_TC_BODY(dbregs_preserve_dr1, tc)
246 {
247 dbreg_preserve(1, dbreg_preserve_mode_none);
248 }
249
250 ATF_TC(dbregs_preserve_dr2);
251 ATF_TC_HEAD(dbregs_preserve_dr2, tc)
252 {
253 atf_tc_set_md_var(tc, "descr",
254 "Verify that setting DR2 is preserved across ptrace(2) calls");
255 }
256
257 ATF_TC_BODY(dbregs_preserve_dr2, tc)
258 {
259 dbreg_preserve(2, dbreg_preserve_mode_none);
260 }
261
262 ATF_TC(dbregs_preserve_dr3);
263 ATF_TC_HEAD(dbregs_preserve_dr3, tc)
264 {
265 atf_tc_set_md_var(tc, "descr",
266 "Verify that setting DR3 is preserved across ptrace(2) calls");
267 }
268
269 ATF_TC_BODY(dbregs_preserve_dr3, tc)
270 {
271 dbreg_preserve(3, dbreg_preserve_mode_none);
272 }
273
274 ATF_TC(dbregs_preserve_dr0_yield);
275 ATF_TC_HEAD(dbregs_preserve_dr0_yield, tc)
276 {
277 atf_tc_set_md_var(tc, "descr",
278 "Verify that setting DR0 is preserved across ptrace(2) calls with "
279 "scheduler yield");
280 }
281
282 ATF_TC_BODY(dbregs_preserve_dr0_yield, tc)
283 {
284 dbreg_preserve(0, dbreg_preserve_mode_yield);
285 }
286
287 ATF_TC(dbregs_preserve_dr1_yield);
288 ATF_TC_HEAD(dbregs_preserve_dr1_yield, tc)
289 {
290 atf_tc_set_md_var(tc, "descr",
291 "Verify that setting DR1 is preserved across ptrace(2) calls with "
292 "scheduler yield");
293 }
294
295 ATF_TC_BODY(dbregs_preserve_dr1_yield, tc)
296 {
297 dbreg_preserve(0, dbreg_preserve_mode_yield);
298 }
299
300 ATF_TC(dbregs_preserve_dr2_yield);
301 ATF_TC_HEAD(dbregs_preserve_dr2_yield, tc)
302 {
303 atf_tc_set_md_var(tc, "descr",
304 "Verify that setting DR2 is preserved across ptrace(2) calls with "
305 "scheduler yield");
306 }
307
308 ATF_TC_BODY(dbregs_preserve_dr2_yield, tc)
309 {
310 dbreg_preserve(0, dbreg_preserve_mode_yield);
311 }
312
313
314 ATF_TC(dbregs_preserve_dr3_yield);
315 ATF_TC_HEAD(dbregs_preserve_dr3_yield, tc)
316 {
317 atf_tc_set_md_var(tc, "descr",
318 "Verify that setting DR3 is preserved across ptrace(2) calls with "
319 "scheduler yield");
320 }
321
322 ATF_TC_BODY(dbregs_preserve_dr3_yield, tc)
323 {
324 dbreg_preserve(3, dbreg_preserve_mode_yield);
325 }
326
327 ATF_TC(dbregs_preserve_dr0_continued);
328 ATF_TC_HEAD(dbregs_preserve_dr0_continued, tc)
329 {
330 atf_tc_set_md_var(tc, "descr",
331 "Verify that setting DR0 is preserved across ptrace(2) calls and "
332 "with continued child");
333 }
334
335 ATF_TC_BODY(dbregs_preserve_dr0_continued, tc)
336 {
337 dbreg_preserve(0, dbreg_preserve_mode_continued);
338 }
339
340 ATF_TC(dbregs_preserve_dr1_continued);
341 ATF_TC_HEAD(dbregs_preserve_dr1_continued, tc)
342 {
343 atf_tc_set_md_var(tc, "descr",
344 "Verify that setting DR1 is preserved across ptrace(2) calls and "
345 "with continued child");
346 }
347
348 ATF_TC_BODY(dbregs_preserve_dr1_continued, tc)
349 {
350 dbreg_preserve(1, dbreg_preserve_mode_continued);
351 }
352
353 ATF_TC(dbregs_preserve_dr2_continued);
354 ATF_TC_HEAD(dbregs_preserve_dr2_continued, tc)
355 {
356 atf_tc_set_md_var(tc, "descr",
357 "Verify that setting DR2 is preserved across ptrace(2) calls and "
358 "with continued child");
359 }
360
361 ATF_TC_BODY(dbregs_preserve_dr2_continued, tc)
362 {
363 dbreg_preserve(2, dbreg_preserve_mode_continued);
364 }
365
366 ATF_TC(dbregs_preserve_dr3_continued);
367 ATF_TC_HEAD(dbregs_preserve_dr3_continued, tc)
368 {
369 atf_tc_set_md_var(tc, "descr",
370 "Verify that setting DR3 is preserved across ptrace(2) calls and "
371 "with continued child");
372 }
373
374 ATF_TC_BODY(dbregs_preserve_dr3_continued, tc)
375 {
376 dbreg_preserve(3, dbreg_preserve_mode_continued);
377 }
378
379
380 static void
381 dbregs_trap_variable(int reg, int cond, int len, bool write)
382 {
383 const int exitval = 5;
384 const int sigval = SIGSTOP;
385 pid_t child, wpid;
386 #if defined(TWAIT_HAVE_STATUS)
387 int status;
388 #endif
389 struct dbreg r1;
390 size_t i;
391 volatile int watchme = 0;
392 union u dr7;
393
394 struct ptrace_siginfo info;
395 memset(&info, 0, sizeof(info));
396
397 if (!can_we_set_dbregs()) {
398 atf_tc_skip("Either run this test as root or set sysctl(3) "
399 "security.models.extensions.user_set_dbregs to 1");
400 }
401
402 dr7.raw = 0;
403 switch (reg) {
404 case 0:
405 dr7.bits.global_dr0_breakpoint = 1;
406 dr7.bits.condition_dr0 = cond;
407 dr7.bits.len_dr0 = len;
408 break;
409 case 1:
410 dr7.bits.global_dr1_breakpoint = 1;
411 dr7.bits.condition_dr1 = cond;
412 dr7.bits.len_dr1 = len;
413 break;
414 case 2:
415 dr7.bits.global_dr2_breakpoint = 1;
416 dr7.bits.condition_dr2 = cond;
417 dr7.bits.len_dr2 = len;
418 break;
419 case 3:
420 dr7.bits.global_dr3_breakpoint = 1;
421 dr7.bits.condition_dr3 = cond;
422 dr7.bits.len_dr3 = len;
423 break;
424 }
425
426 DPRINTF("Before forking process PID=%d\n", getpid());
427 SYSCALL_REQUIRE((child = fork()) != -1);
428 if (child == 0) {
429 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
430 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
431
432 DPRINTF("Before raising %s from child\n", strsignal(sigval));
433 FORKEE_ASSERT(raise(sigval) == 0);
434
435 if (write)
436 watchme = 1;
437 else
438 printf("watchme=%d\n", watchme);
439
440 DPRINTF("Before raising %s from child\n", strsignal(sigval));
441 FORKEE_ASSERT(raise(sigval) == 0);
442
443 DPRINTF("Before exiting of the child process\n");
444 _exit(exitval);
445 }
446 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
447
448 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
449 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
450
451 validate_status_stopped(status, sigval);
452
453 DPRINTF("Call GETDBREGS for the child process (r1)\n");
454 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
455
456 DPRINTF("State of the debug registers (r1):\n");
457 for (i = 0; i < __arraycount(r1.dr); i++)
458 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
459
460 r1.dr[reg] = (long)(intptr_t)&watchme;
461 DPRINTF("Set DR%d (r1.dr[%d]) to new value %" PRIxREGISTER "\n",
462 reg, reg, r1.dr[reg]);
463
464 r1.dr[7] = dr7.raw;
465 DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
466 r1.dr[7]);
467
468 DPRINTF("New state of the debug registers (r1):\n");
469 for (i = 0; i < __arraycount(r1.dr); i++)
470 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
471
472 DPRINTF("Call SETDBREGS for the child process (r1)\n");
473 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
474
475 DPRINTF("Call CONTINUE for the child process\n");
476 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
477
478 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
479 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
480
481 validate_status_stopped(status, SIGTRAP);
482
483 DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
484 SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
485
486 DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
487 DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
488 info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
489 info.psi_siginfo.si_errno);
490
491 DPRINTF("Before checking siginfo_t\n");
492 ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, SIGTRAP);
493 ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_DBREG);
494
495 DPRINTF("Call CONTINUE for the child process\n");
496 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
497
498 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
499 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
500
501 validate_status_stopped(status, sigval);
502
503 DPRINTF("Before resuming the child process where it left off and "
504 "without signal to be sent\n");
505 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
506
507 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
508 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
509
510 validate_status_exited(status, exitval);
511
512 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
513 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
514 }
515
516 ATF_TC(dbregs_dr0_trap_variable_writeonly_byte);
517 ATF_TC_HEAD(dbregs_dr0_trap_variable_writeonly_byte, tc)
518 {
519 atf_tc_set_md_var(tc, "descr",
520 "Verify that setting trap with DR0 triggers SIGTRAP "
521 "(break on data writes only and 1 byte mode)");
522 }
523
524 ATF_TC_BODY(dbregs_dr0_trap_variable_writeonly_byte, tc)
525 {
526 /* 0b01 -- break on data write only */
527 /* 0b00 -- 1 byte */
528
529 dbregs_trap_variable(0, 1, 0, true);
530 }
531
532 ATF_TC(dbregs_dr1_trap_variable_writeonly_byte);
533 ATF_TC_HEAD(dbregs_dr1_trap_variable_writeonly_byte, tc)
534 {
535 atf_tc_set_md_var(tc, "descr",
536 "Verify that setting trap with DR1 triggers SIGTRAP "
537 "(break on data writes only and 1 byte mode)");
538 }
539
540 ATF_TC_BODY(dbregs_dr1_trap_variable_writeonly_byte, tc)
541 {
542 /* 0b01 -- break on data write only */
543 /* 0b00 -- 1 byte */
544
545 dbregs_trap_variable(1, 1, 0, true);
546 }
547
548 ATF_TC(dbregs_dr2_trap_variable_writeonly_byte);
549 ATF_TC_HEAD(dbregs_dr2_trap_variable_writeonly_byte, tc)
550 {
551 atf_tc_set_md_var(tc, "descr",
552 "Verify that setting trap with DR2 triggers SIGTRAP "
553 "(break on data writes only and 1 byte mode)");
554 }
555
556 ATF_TC_BODY(dbregs_dr2_trap_variable_writeonly_byte, tc)
557 {
558 /* 0b01 -- break on data write only */
559 /* 0b00 -- 1 byte */
560
561 dbregs_trap_variable(2, 1, 0, true);
562 }
563
564 ATF_TC(dbregs_dr3_trap_variable_writeonly_byte);
565 ATF_TC_HEAD(dbregs_dr3_trap_variable_writeonly_byte, tc)
566 {
567 atf_tc_set_md_var(tc, "descr",
568 "Verify that setting trap with DR3 triggers SIGTRAP "
569 "(break on data writes only and 1 byte mode)");
570 }
571
572 ATF_TC_BODY(dbregs_dr3_trap_variable_writeonly_byte, tc)
573 {
574 /* 0b01 -- break on data write only */
575 /* 0b00 -- 1 byte */
576
577 dbregs_trap_variable(3, 1, 0, true);
578 }
579
580 ATF_TC(dbregs_dr0_trap_variable_writeonly_2bytes);
581 ATF_TC_HEAD(dbregs_dr0_trap_variable_writeonly_2bytes, tc)
582 {
583 atf_tc_set_md_var(tc, "descr",
584 "Verify that setting trap with DR0 triggers SIGTRAP "
585 "(break on data writes only and 2 bytes mode)");
586 }
587
588 ATF_TC_BODY(dbregs_dr0_trap_variable_writeonly_2bytes, tc)
589 {
590 /* 0b01 -- break on data write only */
591 /* 0b01 -- 2 bytes */
592
593 dbregs_trap_variable(0, 1, 1, true);
594 }
595
596 ATF_TC(dbregs_dr1_trap_variable_writeonly_2bytes);
597 ATF_TC_HEAD(dbregs_dr1_trap_variable_writeonly_2bytes, tc)
598 {
599 atf_tc_set_md_var(tc, "descr",
600 "Verify that setting trap with DR1 triggers SIGTRAP "
601 "(break on data writes only and 2 bytes mode)");
602 }
603
604 ATF_TC_BODY(dbregs_dr1_trap_variable_writeonly_2bytes, tc)
605 {
606 /* 0b01 -- break on data write only */
607 /* 0b01 -- 2 bytes */
608
609 dbregs_trap_variable(1, 1, 1, true);
610 }
611
612 ATF_TC(dbregs_dr2_trap_variable_writeonly_2bytes);
613 ATF_TC_HEAD(dbregs_dr2_trap_variable_writeonly_2bytes, tc)
614 {
615 atf_tc_set_md_var(tc, "descr",
616 "Verify that setting trap with DR2 triggers SIGTRAP "
617 "(break on data writes only and 2 bytes mode)");
618 }
619
620 ATF_TC_BODY(dbregs_dr2_trap_variable_writeonly_2bytes, tc)
621 {
622 /* 0b01 -- break on data write only */
623 /* 0b01 -- 2 bytes */
624
625 dbregs_trap_variable(2, 1, 1, true);
626 }
627
628 ATF_TC(dbregs_dr3_trap_variable_writeonly_2bytes);
629 ATF_TC_HEAD(dbregs_dr3_trap_variable_writeonly_2bytes, tc)
630 {
631 atf_tc_set_md_var(tc, "descr",
632 "Verify that setting trap with DR3 triggers SIGTRAP "
633 "(break on data writes only and 2 bytes mode)");
634 }
635
636 ATF_TC_BODY(dbregs_dr3_trap_variable_writeonly_2bytes, tc)
637 {
638 /* 0b01 -- break on data write only */
639 /* 0b01 -- 2 bytes */
640
641 dbregs_trap_variable(3, 1, 1, true);
642 }
643
644 ATF_TC(dbregs_dr0_trap_variable_writeonly_4bytes);
645 ATF_TC_HEAD(dbregs_dr0_trap_variable_writeonly_4bytes, tc)
646 {
647 atf_tc_set_md_var(tc, "descr",
648 "Verify that setting trap with DR0 triggers SIGTRAP "
649 "(break on data writes only and 4 bytes mode)");
650 }
651
652 ATF_TC_BODY(dbregs_dr0_trap_variable_writeonly_4bytes, tc)
653 {
654 /* 0b01 -- break on data write only */
655 /* 0b11 -- 4 bytes */
656
657 dbregs_trap_variable(0, 1, 3, true);
658 }
659
660 ATF_TC(dbregs_dr1_trap_variable_writeonly_4bytes);
661 ATF_TC_HEAD(dbregs_dr1_trap_variable_writeonly_4bytes, tc)
662 {
663 atf_tc_set_md_var(tc, "descr",
664 "Verify that setting trap with DR1 triggers SIGTRAP "
665 "(break on data writes only and 4 bytes mode)");
666 }
667
668 ATF_TC_BODY(dbregs_dr1_trap_variable_writeonly_4bytes, tc)
669 {
670 /* 0b01 -- break on data write only */
671 /* 0b11 -- 4 bytes */
672
673 dbregs_trap_variable(1, 1, 3, true);
674 }
675
676 ATF_TC(dbregs_dr2_trap_variable_writeonly_4bytes);
677 ATF_TC_HEAD(dbregs_dr2_trap_variable_writeonly_4bytes, tc)
678 {
679 atf_tc_set_md_var(tc, "descr",
680 "Verify that setting trap with DR2 triggers SIGTRAP "
681 "(break on data writes only and 4 bytes mode)");
682 }
683
684 ATF_TC_BODY(dbregs_dr2_trap_variable_writeonly_4bytes, tc)
685 {
686 /* 0b01 -- break on data write only */
687 /* 0b11 -- 4 bytes */
688
689 dbregs_trap_variable(2, 1, 3, true);
690 }
691
692 ATF_TC(dbregs_dr3_trap_variable_writeonly_4bytes);
693 ATF_TC_HEAD(dbregs_dr3_trap_variable_writeonly_4bytes, tc)
694 {
695 atf_tc_set_md_var(tc, "descr",
696 "Verify that setting trap with DR3 triggers SIGTRAP "
697 "(break on data writes only and 4 bytes mode)");
698 }
699
700 ATF_TC_BODY(dbregs_dr3_trap_variable_writeonly_4bytes, tc)
701 {
702 /* 0b01 -- break on data write only */
703 /* 0b11 -- 4 bytes */
704
705 dbregs_trap_variable(3, 1, 3, true);
706 }
707
708 ATF_TC(dbregs_dr0_trap_variable_readwrite_write_byte);
709 ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_write_byte, tc)
710 {
711 atf_tc_set_md_var(tc, "descr",
712 "Verify that setting trap with DR0 triggers SIGTRAP "
713 "(break on data read/write trap in read 1 byte mode)");
714 }
715
716 ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_write_byte, tc)
717 {
718 /* 0b11 -- break on data write&read */
719 /* 0b00 -- 1 byte */
720
721 dbregs_trap_variable(0, 3, 0, true);
722 }
723
724 ATF_TC(dbregs_dr1_trap_variable_readwrite_write_byte);
725 ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_write_byte, tc)
726 {
727 atf_tc_set_md_var(tc, "descr",
728 "Verify that setting trap with DR1 triggers SIGTRAP "
729 "(break on data read/write trap in read 1 byte mode)");
730 }
731
732 ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_write_byte, tc)
733 {
734 /* 0b11 -- break on data write&read */
735 /* 0b00 -- 1 byte */
736
737 dbregs_trap_variable(1, 3, 0, true);
738 }
739
740 ATF_TC(dbregs_dr2_trap_variable_readwrite_write_byte);
741 ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_write_byte, tc)
742 {
743 atf_tc_set_md_var(tc, "descr",
744 "Verify that setting trap with DR2 triggers SIGTRAP "
745 "(break on data read/write trap in read 1 byte mode)");
746 }
747
748 ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_write_byte, tc)
749 {
750 /* 0b11 -- break on data write&read */
751 /* 0b00 -- 1 byte */
752
753 dbregs_trap_variable(2, 3, 0, true);
754 }
755
756 ATF_TC(dbregs_dr3_trap_variable_readwrite_write_byte);
757 ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_write_byte, tc)
758 {
759 atf_tc_set_md_var(tc, "descr",
760 "Verify that setting trap with DR3 triggers SIGTRAP "
761 "(break on data read/write trap in read 1 byte mode)");
762 }
763
764 ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_write_byte, tc)
765 {
766 /* 0b11 -- break on data write&read */
767 /* 0b00 -- 1 byte */
768
769 dbregs_trap_variable(3, 3, 0, true);
770 }
771
772 ATF_TC(dbregs_dr0_trap_variable_readwrite_write_2bytes);
773 ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_write_2bytes, tc)
774 {
775 atf_tc_set_md_var(tc, "descr",
776 "Verify that setting trap with DR0 triggers SIGTRAP "
777 "(break on data read/write trap in read 2 bytes mode)");
778 }
779
780 ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_write_2bytes, tc)
781 {
782 /* 0b11 -- break on data write&read */
783 /* 0b01 -- 2 bytes */
784
785 dbregs_trap_variable(0, 3, 1, true);
786 }
787
788 ATF_TC(dbregs_dr1_trap_variable_readwrite_write_2bytes);
789 ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_write_2bytes, tc)
790 {
791 atf_tc_set_md_var(tc, "descr",
792 "Verify that setting trap with DR1 triggers SIGTRAP "
793 "(break on data read/write trap in read 2 bytes mode)");
794 }
795
796 ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_write_2bytes, tc)
797 {
798 /* 0b11 -- break on data write&read */
799 /* 0b01 -- 2 bytes */
800
801 dbregs_trap_variable(1, 3, 1, true);
802 }
803
804 ATF_TC(dbregs_dr2_trap_variable_readwrite_write_2bytes);
805 ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_write_2bytes, tc)
806 {
807 atf_tc_set_md_var(tc, "descr",
808 "Verify that setting trap with DR2 triggers SIGTRAP "
809 "(break on data read/write trap in read 2 bytes mode)");
810 }
811
812 ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_write_2bytes, tc)
813 {
814 /* 0b11 -- break on data write&read */
815 /* 0b01 -- 2 bytes */
816
817 dbregs_trap_variable(2, 3, 1, true);
818 }
819
820 ATF_TC(dbregs_dr3_trap_variable_readwrite_write_2bytes);
821 ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_write_2bytes, tc)
822 {
823 atf_tc_set_md_var(tc, "descr",
824 "Verify that setting trap with DR3 triggers SIGTRAP "
825 "(break on data read/write trap in read 2 bytes mode)");
826 }
827
828 ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_write_2bytes, tc)
829 {
830 /* 0b11 -- break on data write&read */
831 /* 0b01 -- 2 bytes */
832
833 dbregs_trap_variable(3, 3, 1, true);
834 }
835
836 ATF_TC(dbregs_dr0_trap_variable_readwrite_write_4bytes);
837 ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_write_4bytes, tc)
838 {
839 atf_tc_set_md_var(tc, "descr",
840 "Verify that setting trap with DR0 triggers SIGTRAP "
841 "(break on data read/write trap in read 4 bytes mode)");
842 }
843
844 ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_write_4bytes, tc)
845 {
846 /* 0b11 -- break on data write&read */
847 /* 0b11 -- 4 bytes */
848
849 dbregs_trap_variable(0, 3, 3, true);
850 }
851
852 ATF_TC(dbregs_dr1_trap_variable_readwrite_write_4bytes);
853 ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_write_4bytes, tc)
854 {
855 atf_tc_set_md_var(tc, "descr",
856 "Verify that setting trap with DR1 triggers SIGTRAP "
857 "(break on data read/write trap in read 4 bytes mode)");
858 }
859
860 ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_write_4bytes, tc)
861 {
862 /* 0b11 -- break on data write&read */
863 /* 0b11 -- 4 bytes */
864
865 dbregs_trap_variable(1, 3, 3, true);
866 }
867
868 ATF_TC(dbregs_dr2_trap_variable_readwrite_write_4bytes);
869 ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_write_4bytes, tc)
870 {
871 atf_tc_set_md_var(tc, "descr",
872 "Verify that setting trap with DR2 triggers SIGTRAP "
873 "(break on data read/write trap in read 4 bytes mode)");
874 }
875
876 ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_write_4bytes, tc)
877 {
878 /* 0b11 -- break on data write&read */
879 /* 0b11 -- 4 bytes */
880
881 dbregs_trap_variable(2, 3, 3, true);
882 }
883
884 ATF_TC(dbregs_dr3_trap_variable_readwrite_write_4bytes);
885 ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_write_4bytes, tc)
886 {
887 atf_tc_set_md_var(tc, "descr",
888 "Verify that setting trap with DR3 triggers SIGTRAP "
889 "(break on data read/write trap in read 4 bytes mode)");
890 }
891
892 ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_write_4bytes, tc)
893 {
894 /* 0b11 -- break on data write&read */
895 /* 0b11 -- 4 bytes */
896
897 dbregs_trap_variable(3, 3, 3, true);
898 }
899
900 ATF_TC(dbregs_dr0_trap_variable_readwrite_read_byte);
901 ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_read_byte, tc)
902 {
903 atf_tc_set_md_var(tc, "descr",
904 "Verify that setting trap with DR0 triggers SIGTRAP "
905 "(break on data read/write trap in write 1 byte mode)");
906 }
907
908 ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_read_byte, tc)
909 {
910 /* 0b11 -- break on data write&read */
911 /* 0b00 -- 1 byte */
912
913 dbregs_trap_variable(0, 3, 0, false);
914 }
915
916 ATF_TC(dbregs_dr1_trap_variable_readwrite_read_byte);
917 ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_read_byte, tc)
918 {
919 atf_tc_set_md_var(tc, "descr",
920 "Verify that setting trap with DR1 triggers SIGTRAP "
921 "(break on data read/write trap in write 1 byte mode)");
922 }
923
924 ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_read_byte, tc)
925 {
926 /* 0b11 -- break on data write&read */
927 /* 0b00 -- 1 byte */
928
929 dbregs_trap_variable(1, 3, 0, false);
930 }
931
932 ATF_TC(dbregs_dr2_trap_variable_readwrite_read_byte);
933 ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_read_byte, tc)
934 {
935 atf_tc_set_md_var(tc, "descr",
936 "Verify that setting trap with DR2 triggers SIGTRAP "
937 "(break on data read/write trap in write 1 byte mode)");
938 }
939
940 ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_read_byte, tc)
941 {
942 /* 0b11 -- break on data write&read */
943 /* 0b00 -- 1 byte */
944
945 dbregs_trap_variable(2, 3, 0, false);
946 }
947
948 ATF_TC(dbregs_dr3_trap_variable_readwrite_read_byte);
949 ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_read_byte, tc)
950 {
951 atf_tc_set_md_var(tc, "descr",
952 "Verify that setting trap with DR3 triggers SIGTRAP "
953 "(break on data read/write trap in write 1 byte mode)");
954 }
955
956 ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_read_byte, tc)
957 {
958 /* 0b11 -- break on data write&read */
959 /* 0b00 -- 1 byte */
960
961 dbregs_trap_variable(3, 3, 0, false);
962 }
963
964 ATF_TC(dbregs_dr0_trap_variable_readwrite_read_2bytes);
965 ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_read_2bytes, tc)
966 {
967 atf_tc_set_md_var(tc, "descr",
968 "Verify that setting trap with DR0 triggers SIGTRAP "
969 "(break on data read/write trap in write 2 bytes mode)");
970 }
971
972 ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_read_2bytes, tc)
973 {
974 /* 0b11 -- break on data write&read */
975 /* 0b01 -- 2 bytes */
976
977 dbregs_trap_variable(0, 3, 1, false);
978 }
979
980 ATF_TC(dbregs_dr1_trap_variable_readwrite_read_2bytes);
981 ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_read_2bytes, tc)
982 {
983 atf_tc_set_md_var(tc, "descr",
984 "Verify that setting trap with DR1 triggers SIGTRAP "
985 "(break on data read/write trap in write 2 bytes mode)");
986 }
987
988 ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_read_2bytes, tc)
989 {
990 /* 0b11 -- break on data write&read */
991 /* 0b01 -- 2 bytes */
992
993 dbregs_trap_variable(1, 3, 1, false);
994 }
995
996 ATF_TC(dbregs_dr2_trap_variable_readwrite_read_2bytes);
997 ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_read_2bytes, tc)
998 {
999 atf_tc_set_md_var(tc, "descr",
1000 "Verify that setting trap with DR2 triggers SIGTRAP "
1001 "(break on data read/write trap in write 2 bytes mode)");
1002 }
1003
1004 ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_read_2bytes, tc)
1005 {
1006 /* 0b11 -- break on data write&read */
1007 /* 0b01 -- 2 bytes */
1008
1009 dbregs_trap_variable(2, 3, 1, false);
1010 }
1011
1012 ATF_TC(dbregs_dr3_trap_variable_readwrite_read_2bytes);
1013 ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_read_2bytes, tc)
1014 {
1015 atf_tc_set_md_var(tc, "descr",
1016 "Verify that setting trap with DR3 triggers SIGTRAP "
1017 "(break on data read/write trap in write 2 bytes mode)");
1018 }
1019
1020 ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_read_2bytes, tc)
1021 {
1022 /* 0b11 -- break on data write&read */
1023 /* 0b01 -- 2 bytes */
1024
1025 dbregs_trap_variable(3, 3, 1, false);
1026 }
1027
1028 ATF_TC(dbregs_dr0_trap_variable_readwrite_read_4bytes);
1029 ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_read_4bytes, tc)
1030 {
1031 atf_tc_set_md_var(tc, "descr",
1032 "Verify that setting trap with DR0 triggers SIGTRAP "
1033 "(break on data read/write trap in write 4 bytes mode)");
1034 }
1035
1036 ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_read_4bytes, tc)
1037 {
1038 /* 0b11 -- break on data write&read */
1039 /* 0b11 -- 4 bytes */
1040
1041 dbregs_trap_variable(0, 3, 3, false);
1042 }
1043
1044 ATF_TC(dbregs_dr1_trap_variable_readwrite_read_4bytes);
1045 ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_read_4bytes, tc)
1046 {
1047 atf_tc_set_md_var(tc, "descr",
1048 "Verify that setting trap with DR1 triggers SIGTRAP "
1049 "(break on data read/write trap in write 4 bytes mode)");
1050 }
1051
1052 ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_read_4bytes, tc)
1053 {
1054 /* 0b11 -- break on data write&read */
1055 /* 0b11 -- 4 bytes */
1056
1057 dbregs_trap_variable(1, 3, 3, false);
1058 }
1059
1060 ATF_TC(dbregs_dr2_trap_variable_readwrite_read_4bytes);
1061 ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_read_4bytes, tc)
1062 {
1063 atf_tc_set_md_var(tc, "descr",
1064 "Verify that setting trap with DR2 triggers SIGTRAP "
1065 "(break on data read/write trap in write 4 bytes mode)");
1066 }
1067
1068 ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_read_4bytes, tc)
1069 {
1070 /* 0b11 -- break on data write&read */
1071 /* 0b11 -- 4 bytes */
1072
1073 dbregs_trap_variable(2, 3, 3, false);
1074 }
1075
1076 ATF_TC(dbregs_dr3_trap_variable_readwrite_read_4bytes);
1077 ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_read_4bytes, tc)
1078 {
1079 atf_tc_set_md_var(tc, "descr",
1080 "Verify that setting trap with DR3 triggers SIGTRAP "
1081 "(break on data read/write trap in write 4 bytes mode)");
1082 }
1083
1084 ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_read_4bytes, tc)
1085 {
1086 /* 0b11 -- break on data write&read */
1087 /* 0b11 -- 4 bytes */
1088
1089 dbregs_trap_variable(3, 3, 3, false);
1090 }
1091
1092 #if defined(HAVE_DBREGS)
1093 ATF_TC(dbregs_dr0_trap_code);
1094 ATF_TC_HEAD(dbregs_dr0_trap_code, tc)
1095 {
1096 atf_tc_set_md_var(tc, "descr",
1097 "Verify that setting trap with DR0 triggers SIGTRAP "
1098 "(break on code execution trap)");
1099 }
1100
1101 ATF_TC_BODY(dbregs_dr0_trap_code, tc)
1102 {
1103 const int exitval = 5;
1104 const int sigval = SIGSTOP;
1105 pid_t child, wpid;
1106 #if defined(TWAIT_HAVE_STATUS)
1107 int status;
1108 #endif
1109 struct dbreg r1;
1110 size_t i;
1111 volatile int watchme = 1;
1112 union u dr7;
1113
1114 struct ptrace_siginfo info;
1115 memset(&info, 0, sizeof(info));
1116
1117 if (!can_we_set_dbregs()) {
1118 atf_tc_skip("Either run this test as root or set sysctl(3) "
1119 "security.models.extensions.user_set_dbregs to 1");
1120 }
1121
1122 dr7.raw = 0;
1123 dr7.bits.global_dr0_breakpoint = 1;
1124 dr7.bits.condition_dr0 = 0; /* 0b00 -- break on code execution */
1125 dr7.bits.len_dr0 = 0; /* 0b00 -- 1 byte */
1126
1127 DPRINTF("Before forking process PID=%d\n", getpid());
1128 SYSCALL_REQUIRE((child = fork()) != -1);
1129 if (child == 0) {
1130 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1131 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1132
1133 DPRINTF("Before raising %s from child\n", strsignal(sigval));
1134 FORKEE_ASSERT(raise(sigval) == 0);
1135
1136 printf("check_happy(%d)=%d\n", watchme, check_happy(watchme));
1137
1138 DPRINTF("Before raising %s from child\n", strsignal(sigval));
1139 FORKEE_ASSERT(raise(sigval) == 0);
1140
1141 DPRINTF("Before exiting of the child process\n");
1142 _exit(exitval);
1143 }
1144 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1145
1146 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1147 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1148
1149 validate_status_stopped(status, sigval);
1150
1151 DPRINTF("Call GETDBREGS for the child process (r1)\n");
1152 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1153
1154 DPRINTF("State of the debug registers (r1):\n");
1155 for (i = 0; i < __arraycount(r1.dr); i++)
1156 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1157
1158 r1.dr[0] = (long)(intptr_t)check_happy;
1159 DPRINTF("Set DR0 (r1.dr[0]) to new value %" PRIxREGISTER "\n",
1160 r1.dr[0]);
1161
1162 r1.dr[7] = dr7.raw;
1163 DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1164 r1.dr[7]);
1165
1166 DPRINTF("New state of the debug registers (r1):\n");
1167 for (i = 0; i < __arraycount(r1.dr); i++)
1168 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1169
1170 DPRINTF("Call SETDBREGS for the child process (r1)\n");
1171 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1172
1173 DPRINTF("Call CONTINUE for the child process\n");
1174 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1175
1176 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1177 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1178
1179 validate_status_stopped(status, SIGTRAP);
1180
1181 DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
1182 SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
1183
1184 DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
1185 DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
1186 info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
1187 info.psi_siginfo.si_errno);
1188
1189 DPRINTF("Before checking siginfo_t\n");
1190 ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, SIGTRAP);
1191 ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_DBREG);
1192
1193 DPRINTF("Remove code trap from check_happy=%p\n", check_happy);
1194 dr7.bits.global_dr0_breakpoint = 0;
1195 r1.dr[7] = dr7.raw;
1196 DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1197 r1.dr[7]);
1198
1199 DPRINTF("Call SETDBREGS for the child process (r1)\n");
1200 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1201
1202 DPRINTF("Call CONTINUE for the child process\n");
1203 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1204
1205 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1206 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1207
1208 validate_status_stopped(status, sigval);
1209
1210 DPRINTF("Before resuming the child process where it left off and "
1211 "without signal to be sent\n");
1212 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1213
1214 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1215 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1216
1217 validate_status_exited(status, exitval);
1218
1219 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1220 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1221 }
1222 #endif
1223
1224 #if defined(HAVE_DBREGS)
1225 ATF_TC(dbregs_dr1_trap_code);
1226 ATF_TC_HEAD(dbregs_dr1_trap_code, tc)
1227 {
1228 atf_tc_set_md_var(tc, "descr",
1229 "Verify that setting trap with DR1 triggers SIGTRAP "
1230 "(break on code execution trap)");
1231 }
1232
1233 ATF_TC_BODY(dbregs_dr1_trap_code, tc)
1234 {
1235 const int exitval = 5;
1236 const int sigval = SIGSTOP;
1237 pid_t child, wpid;
1238 #if defined(TWAIT_HAVE_STATUS)
1239 int status;
1240 #endif
1241 struct dbreg r1;
1242 size_t i;
1243 volatile int watchme = 1;
1244 union u dr7;
1245
1246 struct ptrace_siginfo info;
1247 memset(&info, 0, sizeof(info));
1248
1249 if (!can_we_set_dbregs()) {
1250 atf_tc_skip("Either run this test as root or set sysctl(3) "
1251 "security.models.extensions.user_set_dbregs to 1");
1252 }
1253
1254 dr7.raw = 0;
1255 dr7.bits.global_dr1_breakpoint = 1;
1256 dr7.bits.condition_dr1 = 0; /* 0b00 -- break on code execution */
1257 dr7.bits.len_dr1 = 0; /* 0b00 -- 1 byte */
1258
1259 DPRINTF("Before forking process PID=%d\n", getpid());
1260 SYSCALL_REQUIRE((child = fork()) != -1);
1261 if (child == 0) {
1262 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1263 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1264
1265 DPRINTF("Before raising %s from child\n", strsignal(sigval));
1266 FORKEE_ASSERT(raise(sigval) == 0);
1267
1268 printf("check_happy(%d)=%d\n", watchme, check_happy(watchme));
1269
1270 DPRINTF("Before raising %s from child\n", strsignal(sigval));
1271 FORKEE_ASSERT(raise(sigval) == 0);
1272
1273 DPRINTF("Before exiting of the child process\n");
1274 _exit(exitval);
1275 }
1276 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1277
1278 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1279 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1280
1281 validate_status_stopped(status, sigval);
1282
1283 DPRINTF("Call GETDBREGS for the child process (r1)\n");
1284 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1285
1286 DPRINTF("State of the debug registers (r1):\n");
1287 for (i = 0; i < __arraycount(r1.dr); i++)
1288 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1289
1290 r1.dr[1] = (long)(intptr_t)check_happy;
1291 DPRINTF("Set DR1 (r1.dr[1]) to new value %" PRIxREGISTER "\n",
1292 r1.dr[1]);
1293
1294 r1.dr[7] = dr7.raw;
1295 DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1296 r1.dr[7]);
1297
1298 DPRINTF("New state of the debug registers (r1):\n");
1299 for (i = 0; i < __arraycount(r1.dr); i++)
1300 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1301
1302 DPRINTF("Call SETDBREGS for the child process (r1)\n");
1303 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1304
1305 DPRINTF("Call CONTINUE for the child process\n");
1306 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1307
1308 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1309 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1310
1311 validate_status_stopped(status, SIGTRAP);
1312
1313 DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
1314 SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
1315
1316 DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
1317 DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
1318 info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
1319 info.psi_siginfo.si_errno);
1320
1321 DPRINTF("Before checking siginfo_t\n");
1322 ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, SIGTRAP);
1323 ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_DBREG);
1324
1325 DPRINTF("Remove code trap from check_happy=%p\n", check_happy);
1326 dr7.bits.global_dr1_breakpoint = 0;
1327 r1.dr[7] = dr7.raw;
1328 DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1329 r1.dr[7]);
1330
1331 DPRINTF("Call SETDBREGS for the child process (r1)\n");
1332 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1333
1334 DPRINTF("Call CONTINUE for the child process\n");
1335 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1336
1337 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1338 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1339
1340 validate_status_stopped(status, sigval);
1341
1342 DPRINTF("Before resuming the child process where it left off and "
1343 "without signal to be sent\n");
1344 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1345
1346 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1347 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1348
1349 validate_status_exited(status, exitval);
1350
1351 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1352 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1353 }
1354 #endif
1355
1356 #if defined(HAVE_DBREGS)
1357 ATF_TC(dbregs_dr2_trap_code);
1358 ATF_TC_HEAD(dbregs_dr2_trap_code, tc)
1359 {
1360 atf_tc_set_md_var(tc, "descr",
1361 "Verify that setting trap with DR2 triggers SIGTRAP "
1362 "(break on code execution trap)");
1363 }
1364
1365 ATF_TC_BODY(dbregs_dr2_trap_code, tc)
1366 {
1367 const int exitval = 5;
1368 const int sigval = SIGSTOP;
1369 pid_t child, wpid;
1370 #if defined(TWAIT_HAVE_STATUS)
1371 int status;
1372 #endif
1373 struct dbreg r1;
1374 size_t i;
1375 volatile int watchme = 1;
1376 union u dr7;
1377
1378 struct ptrace_siginfo info;
1379 memset(&info, 0, sizeof(info));
1380
1381 if (!can_we_set_dbregs()) {
1382 atf_tc_skip("Either run this test as root or set sysctl(3) "
1383 "security.models.extensions.user_set_dbregs to 1");
1384 }
1385
1386 dr7.raw = 0;
1387 dr7.bits.global_dr2_breakpoint = 1;
1388 dr7.bits.condition_dr2 = 0; /* 0b00 -- break on code execution */
1389 dr7.bits.len_dr2 = 0; /* 0b00 -- 1 byte */
1390
1391 DPRINTF("Before forking process PID=%d\n", getpid());
1392 SYSCALL_REQUIRE((child = fork()) != -1);
1393 if (child == 0) {
1394 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1395 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1396
1397 DPRINTF("Before raising %s from child\n", strsignal(sigval));
1398 FORKEE_ASSERT(raise(sigval) == 0);
1399
1400 printf("check_happy(%d)=%d\n", watchme, check_happy(watchme));
1401
1402 DPRINTF("Before raising %s from child\n", strsignal(sigval));
1403 FORKEE_ASSERT(raise(sigval) == 0);
1404
1405 DPRINTF("Before exiting of the child process\n");
1406 _exit(exitval);
1407 }
1408 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1409
1410 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1411 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1412
1413 validate_status_stopped(status, sigval);
1414
1415 DPRINTF("Call GETDBREGS for the child process (r1)\n");
1416 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1417
1418 DPRINTF("State of the debug registers (r1):\n");
1419 for (i = 0; i < __arraycount(r1.dr); i++)
1420 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1421
1422 r1.dr[2] = (long)(intptr_t)check_happy;
1423 DPRINTF("Set DR2 (r1.dr[2]) to new value %" PRIxREGISTER "\n",
1424 r1.dr[2]);
1425
1426 r1.dr[7] = dr7.raw;
1427 DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1428 r1.dr[7]);
1429
1430 DPRINTF("New state of the debug registers (r1):\n");
1431 for (i = 0; i < __arraycount(r1.dr); i++)
1432 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1433
1434 DPRINTF("Call SETDBREGS for the child process (r1)\n");
1435 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1436
1437 DPRINTF("Call CONTINUE for the child process\n");
1438 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1439
1440 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1441 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1442
1443 validate_status_stopped(status, SIGTRAP);
1444
1445 DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
1446 SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
1447
1448 DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
1449 DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
1450 info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
1451 info.psi_siginfo.si_errno);
1452
1453 DPRINTF("Before checking siginfo_t\n");
1454 ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, SIGTRAP);
1455 ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_DBREG);
1456
1457 DPRINTF("Remove code trap from check_happy=%p\n", check_happy);
1458 dr7.bits.global_dr2_breakpoint = 0;
1459 r1.dr[7] = dr7.raw;
1460 DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1461 r1.dr[7]);
1462
1463 DPRINTF("Call SETDBREGS for the child process (r1)\n");
1464 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1465
1466 DPRINTF("Call CONTINUE for the child process\n");
1467 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1468
1469 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1470 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1471
1472 validate_status_stopped(status, sigval);
1473
1474 DPRINTF("Before resuming the child process where it left off and "
1475 "without signal to be sent\n");
1476 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1477
1478 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1479 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1480
1481 validate_status_exited(status, exitval);
1482
1483 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1484 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1485 }
1486 #endif
1487
1488 #if defined(HAVE_DBREGS)
1489 ATF_TC(dbregs_dr3_trap_code);
1490 ATF_TC_HEAD(dbregs_dr3_trap_code, tc)
1491 {
1492 atf_tc_set_md_var(tc, "descr",
1493 "Verify that setting trap with DR3 triggers SIGTRAP "
1494 "(break on code execution trap)");
1495 }
1496
1497 ATF_TC_BODY(dbregs_dr3_trap_code, tc)
1498 {
1499 const int exitval = 5;
1500 const int sigval = SIGSTOP;
1501 pid_t child, wpid;
1502 #if defined(TWAIT_HAVE_STATUS)
1503 int status;
1504 #endif
1505 struct dbreg r1;
1506 size_t i;
1507 volatile int watchme = 1;
1508 union u dr7;
1509
1510 struct ptrace_siginfo info;
1511 memset(&info, 0, sizeof(info));
1512
1513 if (!can_we_set_dbregs()) {
1514 atf_tc_skip("Either run this test as root or set sysctl(3) "
1515 "security.models.extensions.user_set_dbregs to 1");
1516 }
1517
1518 dr7.raw = 0;
1519 dr7.bits.global_dr3_breakpoint = 1;
1520 dr7.bits.condition_dr3 = 0; /* 0b00 -- break on code execution */
1521 dr7.bits.len_dr3 = 0; /* 0b00 -- 1 byte */
1522
1523 DPRINTF("Before forking process PID=%d\n", getpid());
1524 SYSCALL_REQUIRE((child = fork()) != -1);
1525 if (child == 0) {
1526 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1527 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1528
1529 DPRINTF("Before raising %s from child\n", strsignal(sigval));
1530 FORKEE_ASSERT(raise(sigval) == 0);
1531
1532 printf("check_happy(%d)=%d\n", watchme, check_happy(watchme));
1533
1534 DPRINTF("Before raising %s from child\n", strsignal(sigval));
1535 FORKEE_ASSERT(raise(sigval) == 0);
1536
1537 DPRINTF("Before exiting of the child process\n");
1538 _exit(exitval);
1539 }
1540 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1541
1542 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1543 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1544
1545 validate_status_stopped(status, sigval);
1546
1547 DPRINTF("Call GETDBREGS for the child process (r1)\n");
1548 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1549
1550 DPRINTF("State of the debug registers (r1):\n");
1551 for (i = 0; i < __arraycount(r1.dr); i++)
1552 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1553
1554 r1.dr[3] = (long)(intptr_t)check_happy;
1555 DPRINTF("Set DR3 (r1.dr[3]) to new value %" PRIxREGISTER "\n",
1556 r1.dr[3]);
1557
1558 r1.dr[7] = dr7.raw;
1559 DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1560 r1.dr[7]);
1561
1562 DPRINTF("New state of the debug registers (r1):\n");
1563 for (i = 0; i < __arraycount(r1.dr); i++)
1564 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1565
1566 DPRINTF("Call SETDBREGS for the child process (r1)\n");
1567 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1568
1569 DPRINTF("Call CONTINUE for the child process\n");
1570 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1571
1572 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1573 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1574
1575 validate_status_stopped(status, SIGTRAP);
1576
1577 DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
1578 SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
1579
1580 DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
1581 DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
1582 info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
1583 info.psi_siginfo.si_errno);
1584
1585 DPRINTF("Before checking siginfo_t\n");
1586 ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, SIGTRAP);
1587 ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_DBREG);
1588
1589 DPRINTF("Remove code trap from check_happy=%p\n", check_happy);
1590 dr7.bits.global_dr3_breakpoint = 0;
1591 r1.dr[7] = dr7.raw;
1592 DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1593 r1.dr[7]);
1594
1595 DPRINTF("Call SETDBREGS for the child process (r1)\n");
1596 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1597
1598 DPRINTF("Call CONTINUE for the child process\n");
1599 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1600
1601 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1602 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1603
1604 validate_status_stopped(status, sigval);
1605
1606 DPRINTF("Before resuming the child process where it left off and "
1607 "without signal to be sent\n");
1608 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1609
1610 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1611 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1612
1613 validate_status_exited(status, exitval);
1614
1615 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1616 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1617 }
1618 #endif
1619
1620 volatile lwpid_t x86_the_lwp_id = 0;
1621
1622 static void __used
1623 x86_lwp_main_func(void *arg)
1624 {
1625 x86_the_lwp_id = _lwp_self();
1626 _lwp_exit();
1627 }
1628
1629 static void
1630 dbregs_dont_inherit_lwp(int reg)
1631 {
1632 const int exitval = 5;
1633 const int sigval = SIGSTOP;
1634 pid_t child, wpid;
1635 #if defined(TWAIT_HAVE_STATUS)
1636 int status;
1637 #endif
1638 ptrace_state_t state;
1639 const int slen = sizeof(state);
1640 ptrace_event_t event;
1641 const int elen = sizeof(event);
1642 ucontext_t uc;
1643 lwpid_t lid;
1644 static const size_t ssize = 16*1024;
1645 void *stack;
1646 size_t i;
1647 struct dbreg r1;
1648 struct dbreg r2;
1649
1650 if (!can_we_set_dbregs()) {
1651 atf_tc_skip("Either run this test as root or set sysctl(3) "
1652 "security.models.extensions.user_set_dbregs to 1");
1653 }
1654
1655 DPRINTF("Before forking process PID=%d\n", getpid());
1656 SYSCALL_REQUIRE((child = fork()) != -1);
1657 if (child == 0) {
1658 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1659 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1660
1661 DPRINTF("Before raising %s from child\n", strsignal(sigval));
1662 FORKEE_ASSERT(raise(sigval) == 0);
1663
1664 DPRINTF("Before allocating memory for stack in child\n");
1665 FORKEE_ASSERT((stack = malloc(ssize)) != NULL);
1666
1667 DPRINTF("Before making context for new lwp in child\n");
1668 _lwp_makecontext(&uc, x86_lwp_main_func, NULL, NULL, stack,
1669 ssize);
1670
1671 DPRINTF("Before creating new in child\n");
1672 FORKEE_ASSERT(_lwp_create(&uc, 0, &lid) == 0);
1673
1674 DPRINTF("Before waiting for lwp %d to exit\n", lid);
1675 FORKEE_ASSERT(_lwp_wait(lid, NULL) == 0);
1676
1677 DPRINTF("Before verifying that reported %d and running lid %d "
1678 "are the same\n", lid, x86_the_lwp_id);
1679 FORKEE_ASSERT_EQ(lid, x86_the_lwp_id);
1680
1681 DPRINTF("Before exiting of the child process\n");
1682 _exit(exitval);
1683 }
1684 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1685
1686 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1687 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1688
1689 validate_status_stopped(status, sigval);
1690
1691 DPRINTF("Set empty EVENT_MASK for the child %d\n", child);
1692 event.pe_set_event = PTRACE_LWP_CREATE;
1693 SYSCALL_REQUIRE(ptrace(PT_SET_EVENT_MASK, child, &event, elen) != -1);
1694
1695 DPRINTF("Call GETDBREGS for the child process (r1)\n");
1696 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1697
1698 DPRINTF("State of the debug registers (r1):\n");
1699 for (i = 0; i < __arraycount(r1.dr); i++)
1700 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1701
1702 r1.dr[reg] = (long)(intptr_t)check_happy;
1703 DPRINTF("Set DR%d (r1.dr[%d]) to new value %" PRIxREGISTER "\n",
1704 reg, reg, r1.dr[0]);
1705
1706 DPRINTF("New state of the debug registers (r1):\n");
1707 for (i = 0; i < __arraycount(r1.dr); i++)
1708 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1709
1710 DPRINTF("Call SETDBREGS for the child process (r1)\n");
1711 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1712
1713 DPRINTF("Before resuming the child process where it left off and "
1714 "without signal to be sent\n");
1715 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1716
1717 DPRINTF("Before calling %s() for the child - expected stopped "
1718 "SIGTRAP\n", TWAIT_FNAME);
1719 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1720
1721 validate_status_stopped(status, SIGTRAP);
1722
1723 SYSCALL_REQUIRE(ptrace(PT_GET_PROCESS_STATE, child, &state, slen) != -1);
1724
1725 ATF_REQUIRE_EQ(state.pe_report_event, PTRACE_LWP_CREATE);
1726
1727 lid = state.pe_lwp;
1728 DPRINTF("Reported PTRACE_LWP_CREATE event with lid %d\n", lid);
1729
1730 DPRINTF("Call GETDBREGS for the child process new lwp (r2)\n");
1731 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r2, lid) != -1);
1732
1733 DPRINTF("State of the debug registers (r2):\n");
1734 for (i = 0; i < __arraycount(r2.dr); i++)
1735 DPRINTF("r2[%zu]=%" PRIxREGISTER "\n", i, r2.dr[i]);
1736
1737 DPRINTF("Assert that (r1) and (r2) are not the same\n");
1738 ATF_REQUIRE(memcmp(&r1, &r2, sizeof(r1)) != 0);
1739
1740 DPRINTF("Before resuming the child process where it left off and "
1741 "without signal to be sent\n");
1742 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1743
1744 DPRINTF("Before calling %s() for the child - expected exited\n",
1745 TWAIT_FNAME);
1746 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1747
1748 validate_status_exited(status, exitval);
1749
1750 DPRINTF("Before calling %s() for the child - expected no process\n",
1751 TWAIT_FNAME);
1752 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1753 }
1754
1755 ATF_TC(dbregs_dr0_dont_inherit_lwp);
1756 ATF_TC_HEAD(dbregs_dr0_dont_inherit_lwp, tc)
1757 {
1758 atf_tc_set_md_var(tc, "descr",
1759 "Verify that 1 LWP creation is intercepted by ptrace(2) with "
1760 "EVENT_MASK set to PTRACE_LWP_CREATE and Debug Register 0 from "
1761 "the forker thread is not inherited");
1762 }
1763
1764 ATF_TC_BODY(dbregs_dr0_dont_inherit_lwp, tc)
1765 {
1766 dbregs_dont_inherit_lwp(0);
1767 }
1768
1769 ATF_TC(dbregs_dr1_dont_inherit_lwp);
1770 ATF_TC_HEAD(dbregs_dr1_dont_inherit_lwp, tc)
1771 {
1772 atf_tc_set_md_var(tc, "descr",
1773 "Verify that 1 LWP creation is intercepted by ptrace(2) with "
1774 "EVENT_MASK set to PTRACE_LWP_CREATE and Debug Register 1 from "
1775 "the forker thread is not inherited");
1776 }
1777
1778 ATF_TC_BODY(dbregs_dr1_dont_inherit_lwp, tc)
1779 {
1780 dbregs_dont_inherit_lwp(1);
1781 }
1782
1783 ATF_TC(dbregs_dr2_dont_inherit_lwp);
1784 ATF_TC_HEAD(dbregs_dr2_dont_inherit_lwp, tc)
1785 {
1786 atf_tc_set_md_var(tc, "descr",
1787 "Verify that 1 LWP creation is intercepted by ptrace(2) with "
1788 "EVENT_MASK set to PTRACE_LWP_CREATE and Debug Register 2 from "
1789 "the forker thread is not inherited");
1790 }
1791
1792 ATF_TC_BODY(dbregs_dr2_dont_inherit_lwp, tc)
1793 {
1794 dbregs_dont_inherit_lwp(2);
1795 }
1796
1797 ATF_TC(dbregs_dr3_dont_inherit_lwp);
1798 ATF_TC_HEAD(dbregs_dr3_dont_inherit_lwp, tc)
1799 {
1800 atf_tc_set_md_var(tc, "descr",
1801 "Verify that 1 LWP creation is intercepted by ptrace(2) with "
1802 "EVENT_MASK set to PTRACE_LWP_CREATE and Debug Register 3 from "
1803 "the forker thread is not inherited");
1804 }
1805
1806 ATF_TC_BODY(dbregs_dr3_dont_inherit_lwp, tc)
1807 {
1808 dbregs_dont_inherit_lwp(3);
1809 }
1810
1811 static void
1812 dbregs_dont_inherit_execve(int reg)
1813 {
1814 const int sigval = SIGTRAP;
1815 pid_t child, wpid;
1816 #if defined(TWAIT_HAVE_STATUS)
1817 int status;
1818 #endif
1819 size_t i;
1820 struct dbreg r1;
1821 struct dbreg r2;
1822
1823 struct ptrace_siginfo info;
1824 memset(&info, 0, sizeof(info));
1825
1826 if (!can_we_set_dbregs()) {
1827 atf_tc_skip("Either run this test as root or set sysctl(3) "
1828 "security.models.extensions.user_set_dbregs to 1");
1829 }
1830
1831 DPRINTF("Before forking process PID=%d\n", getpid());
1832 SYSCALL_REQUIRE((child = fork()) != -1);
1833 if (child == 0) {
1834 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1835 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1836
1837 DPRINTF("Before raising %s from child\n", strsignal(sigval));
1838 FORKEE_ASSERT(raise(sigval) == 0);
1839
1840 DPRINTF("Before calling execve(2) from child\n");
1841 execlp("/bin/echo", "/bin/echo", NULL);
1842
1843 FORKEE_ASSERT(0 && "Not reached");
1844 }
1845 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1846
1847 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1848 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1849
1850 validate_status_stopped(status, sigval);
1851
1852 DPRINTF("Call GETDBREGS for the child process (r1)\n");
1853 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1854
1855 DPRINTF("State of the debug registers (r1):\n");
1856 for (i = 0; i < __arraycount(r1.dr); i++)
1857 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1858
1859 r1.dr[reg] = (long)(intptr_t)check_happy;
1860 DPRINTF("Set DR%d (r1.dr[%d]) to new value %" PRIxREGISTER "\n",
1861 reg, reg, r1.dr[reg]);
1862
1863 DPRINTF("New state of the debug registers (r1):\n");
1864 for (i = 0; i < __arraycount(r1.dr); i++)
1865 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1866
1867 DPRINTF("Call SETDBREGS for the child process (r1)\n");
1868 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1869
1870 DPRINTF("Before resuming the child process where it left off and "
1871 "without signal to be sent\n");
1872 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1873
1874 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1875 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1876
1877 validate_status_stopped(status, sigval);
1878
1879 DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
1880 SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
1881
1882 DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
1883 DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
1884 info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
1885 info.psi_siginfo.si_errno);
1886
1887 ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, sigval);
1888 ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_EXEC);
1889
1890 DPRINTF("Call GETDBREGS for the child process after execve(2)\n");
1891 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r2, 0) != -1);
1892
1893 DPRINTF("State of the debug registers (r2):\n");
1894 for (i = 0; i < __arraycount(r2.dr); i++)
1895 DPRINTF("r2[%zu]=%" PRIxREGISTER "\n", i, r2.dr[i]);
1896
1897 DPRINTF("Assert that (r1) and (r2) are not the same\n");
1898 ATF_REQUIRE(memcmp(&r1, &r2, sizeof(r1)) != 0);
1899
1900 DPRINTF("Before resuming the child process where it left off and "
1901 "without signal to be sent\n");
1902 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1903
1904 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1905 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1906
1907 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1908 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1909 }
1910
1911 ATF_TC(dbregs_dr0_dont_inherit_execve);
1912 ATF_TC_HEAD(dbregs_dr0_dont_inherit_execve, tc)
1913 {
1914 atf_tc_set_md_var(tc, "descr",
1915 "Verify that execve(2) is intercepted by tracer and Debug "
1916 "Register 0 is reset");
1917 }
1918
1919 ATF_TC_BODY(dbregs_dr0_dont_inherit_execve, tc)
1920 {
1921 dbregs_dont_inherit_execve(0);
1922 }
1923
1924 ATF_TC(dbregs_dr1_dont_inherit_execve);
1925 ATF_TC_HEAD(dbregs_dr1_dont_inherit_execve, tc)
1926 {
1927 atf_tc_set_md_var(tc, "descr",
1928 "Verify that execve(2) is intercepted by tracer and Debug "
1929 "Register 1 is reset");
1930 }
1931
1932 ATF_TC_BODY(dbregs_dr1_dont_inherit_execve, tc)
1933 {
1934 dbregs_dont_inherit_execve(1);
1935 }
1936
1937 ATF_TC(dbregs_dr2_dont_inherit_execve);
1938 ATF_TC_HEAD(dbregs_dr2_dont_inherit_execve, tc)
1939 {
1940 atf_tc_set_md_var(tc, "descr",
1941 "Verify that execve(2) is intercepted by tracer and Debug "
1942 "Register 2 is reset");
1943 }
1944
1945 ATF_TC_BODY(dbregs_dr2_dont_inherit_execve, tc)
1946 {
1947 dbregs_dont_inherit_execve(2);
1948 }
1949
1950 ATF_TC(dbregs_dr3_dont_inherit_execve);
1951 ATF_TC_HEAD(dbregs_dr3_dont_inherit_execve, tc)
1952 {
1953 atf_tc_set_md_var(tc, "descr",
1954 "Verify that execve(2) is intercepted by tracer and Debug "
1955 "Register 3 is reset");
1956 }
1957
1958 ATF_TC_BODY(dbregs_dr3_dont_inherit_execve, tc)
1959 {
1960 dbregs_dont_inherit_execve(3);
1961 }
1962
1963 /// ----------------------------------------------------------------------------
1964
1965 ATF_TC(x86_cve_2018_8897);
1966 ATF_TC_HEAD(x86_cve_2018_8897, tc)
1967 {
1968 atf_tc_set_md_var(tc, "descr",
1969 "Verify mitigation for CVE-2018-8897 (POP SS debug exception)");
1970 }
1971
1972 #define X86_CVE_2018_8897_PAGE 0x5000 /* page addressable by 32-bit registers */
1973
1974 static void
1975 x86_cve_2018_8897_trigger(void)
1976 {
1977 /*
1978 * A function to trigger the POP SS (CVE-2018-8897) vulnerability
1979 *
1980 * ifdef __x86_64__
1981 *
1982 * We need to switch to 32-bit mode execution on 64-bit kernel.
1983 * This is achieved with far jump instruction and GDT descriptor
1984 * set to 32-bit CS selector. The 32-bit CS selector is kernel
1985 * specific, in the NetBSD case registered as GUCODE32_SEL
1986 * that is equal to (14 (decimal) << 3) with GDT and user
1987 * privilege level (this makes it 0x73).
1988 *
1989 * In UNIX as(1) assembly x86_64 far jump is coded as ljmp.
1990 * amd64 ljmp requires an indirect address with cs:RIP.
1991 *
1992 * When we are running in 32-bit mode, it's similar to the
1993 * mode as if the binary had been launched in netbsd32.
1994 *
1995 * There are two versions of this exploit, one with RIP
1996 * relative code and the other with static addresses.
1997 * The first one is PIE code aware, the other no-PIE one.
1998 *
1999 *
2000 * After switching to the 32-bit mode we can move on to the remaining
2001 * part of the exploit.
2002 *
2003 * endif // __x86_64__
2004 *
2005 * Set the stack pointer to the page we allocated earlier. Remember
2006 * that we put an SS selector exactly at this address, so we can pop.
2007 *
2008 * movl $0x5000,%esp
2009 *
2010 * Pop the SS selector off the stack. This reloads the SS selector,
2011 * which is fine. Remember that we set DR0 at address 0x5000, which
2012 * we are now reading. Therefore, on this instruction, the CPU will
2013 * raise a #DB exception.
2014 *
2015 * But the "pop %ss" instruction is special: it blocks exceptions
2016 * until the next instruction is executed. So the #DB that we just
2017 * raised is actually blocked.
2018 *
2019 * pop %ss
2020 *
2021 * We are still here, and didn't receive the #DB. After we execute
2022 * this instruction, the effect of "pop %ss" will disappear, and
2023 * we will receive the #DB for real.
2024 *
2025 * int $4
2026 *
2027 * Here the bug happens. We executed "int $4", so we entered the
2028 * kernel, with interrupts disabled. The #DB that was pending is
2029 * received. But, it is received immediately in kernel mode, and is
2030 * _NOT_ received when interrupts are enabled again.
2031 *
2032 * It means that, in the first instruction of the $4 handler, we
2033 * think we are safe with interrupts disabled. But we aren't, and
2034 * just got interrupted.
2035 *
2036 * The new interrupt handler doesn't handle this particular context:
2037 * we are entered in kernel mode, the previous context was kernel
2038 * mode too but it still had the user context loaded.
2039 *
2040 * We find ourselves not doing a 'swapgs'. At the end of the day, it
2041 * means that we call trap() with a curcpu() that is fully
2042 * controllable by userland. From then on, it is easy to escalate
2043 * privileges.
2044 *
2045 * With SVS it also means we don't switch CR3, so this results in a
2046 * triple fault, which this time cannot be turned to a privilege
2047 * escalation.
2048 */
2049
2050 #if __x86_64__
2051 #if __PIE__
2052 void *csRIP;
2053
2054 csRIP = malloc(sizeof(int) + sizeof(short));
2055 FORKEE_ASSERT(csRIP != NULL);
2056
2057 __asm__ __volatile__(
2058 " leal 24(%%eip), %%eax\n\t"
2059 " movq %0, %%rdx\n\t"
2060 " movl %%eax, (%%rdx)\n\t"
2061 " movw $0x73, 4(%%rdx)\n\t"
2062 " movq %1, %%rax\n\t"
2063 " ljmp *(%%rax)\n\t"
2064 " .code32\n\t"
2065 " movl $0x5000, %%esp\n\t"
2066 " pop %%ss\n\t"
2067 " int $4\n\t"
2068 " .code64\n\t"
2069 : "=m"(csRIP)
2070 : "m"(csRIP)
2071 : "%rax", "%rdx", "%rsp"
2072 );
2073 #else /* !__PIE__ */
2074 __asm__ __volatile__(
2075 " movq $farjmp32, %%rax\n\t"
2076 " ljmp *(%%rax)\n\t"
2077 "farjmp32:\n\t"
2078 " .long trigger32\n\t"
2079 " .word 0x73\n\t"
2080 " .code32\n\t"
2081 "trigger32:\n\t"
2082 " movl $0x5000, %%esp\n\t"
2083 " pop %%ss\n\t"
2084 " int $4\n\t"
2085 " .code64\n\t"
2086 :
2087 :
2088 : "%rax", "%rsp"
2089 );
2090 #endif
2091 #elif __i386__
2092 __asm__ __volatile__(
2093 "movl $0x5000, %%esp\n\t"
2094 "pop %%ss\n\t"
2095 "int $4\n\t"
2096 :
2097 :
2098 : "%esp"
2099 );
2100 #endif
2101 }
2102
2103 ATF_TC_BODY(x86_cve_2018_8897, tc)
2104 {
2105 const int sigval = SIGSTOP;
2106 pid_t child, wpid;
2107 #if defined(TWAIT_HAVE_STATUS)
2108 int status;
2109 #endif
2110 char *trap_page;
2111 struct dbreg db;
2112
2113
2114 if (!can_we_set_dbregs()) {
2115 atf_tc_skip("Either run this test as root or set sysctl(3) "
2116 "security.models.extensions.user_set_dbregs to 1");
2117 }
2118
2119 DPRINTF("Before forking process PID=%d\n", getpid());
2120 SYSCALL_REQUIRE((child = fork()) != -1);
2121 if (child == 0) {
2122 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
2123 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
2124
2125 trap_page = mmap((void *)X86_CVE_2018_8897_PAGE,
2126 sysconf(_SC_PAGESIZE), PROT_READ|PROT_WRITE,
2127 MAP_FIXED|MAP_ANON|MAP_PRIVATE, -1, 0);
2128
2129 /* trigger page fault */
2130 memset(trap_page, 0, sysconf(_SC_PAGESIZE));
2131
2132 // kernel GDT
2133 #if __x86_64__
2134 /* SS selector (descriptor 9 (0x4f >> 3)) */
2135 *trap_page = 0x4f;
2136 #elif __i386__
2137 /* SS selector (descriptor 4 (0x23 >> 3)) */
2138 *trap_page = 0x23;
2139 #endif
2140
2141 DPRINTF("Before raising %s from child\n", strsignal(sigval));
2142 FORKEE_ASSERT(raise(sigval) == 0);
2143
2144 x86_cve_2018_8897_trigger();
2145
2146 /* NOTREACHED */
2147 FORKEE_ASSERTX(0 && "This shall not be reached");
2148 }
2149 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
2150
2151 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2152 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2153
2154 validate_status_stopped(status, sigval);
2155
2156 DPRINTF("Call GETDBREGS for the child process\n");
2157 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &db, 0) != -1);
2158
2159 /*
2160 * Set up the dbregs. We put the 0x5000 address in DR0.
2161 * It means that, the first time we touch this, the CPU will trigger a
2162 * #DB exception.
2163 */
2164 db.dr[0] = X86_CVE_2018_8897_PAGE;
2165 db.dr[7] = 0x30003;
2166
2167 DPRINTF("Call SETDBREGS for the child process\n");
2168 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &db, 0) != -1);
2169
2170 DPRINTF("Before resuming the child process where it left off and "
2171 "without signal to be sent\n");
2172 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
2173
2174 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2175 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2176
2177 // In this test we receive SIGFPE, is this appropriate?
2178 // validate_status_stopped(status, SIGFPE);
2179
2180 DPRINTF("Kill the child process\n");
2181 SYSCALL_REQUIRE(ptrace(PT_KILL, child, NULL, 0) != -1);
2182
2183 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2184 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2185
2186 validate_status_signaled(status, SIGKILL, 0);
2187
2188 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2189 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
2190 }
2191
2192 ATF_TC(x86_regs_mm_read);
2193 ATF_TC_HEAD(x86_regs_mm_read, tc)
2194 {
2195 atf_tc_set_md_var(tc, "descr",
2196 "Set MMX (mm0..mm7) reg values from debugged program and read "
2197 "them via PT_GETFPREGS, comparing values against expected.");
2198 }
2199
2200 __attribute__((target("mmx")))
2201 static __inline void set_mm_regs(const uint64_t mm[])
2202 {
2203 __asm__ __volatile__(
2204 "movq 0x00(%0), %%mm0\n\t"
2205 "movq 0x08(%0), %%mm1\n\t"
2206 "movq 0x10(%0), %%mm2\n\t"
2207 "movq 0x18(%0), %%mm3\n\t"
2208 "movq 0x20(%0), %%mm4\n\t"
2209 "movq 0x28(%0), %%mm5\n\t"
2210 "movq 0x30(%0), %%mm6\n\t"
2211 "movq 0x38(%0), %%mm7\n\t"
2212 "int3\n\t"
2213 :
2214 : "b"(mm)
2215 : "%mm0", "%mm1", "%mm2", "%mm3", "%mm4", "%mm5", "%mm6", "%mm7"
2216 );
2217 }
2218
2219 ATF_TC_BODY(x86_regs_mm_read, tc)
2220 {
2221 const int exitval = 5;
2222 pid_t child, wpid;
2223 #if defined(TWAIT_HAVE_STATUS)
2224 const int sigval = SIGTRAP;
2225 int status;
2226 #endif
2227 struct fpreg fpr;
2228
2229 const uint64_t mm[] = {
2230 0x0001020304050607,
2231 0x1011121314151617,
2232 0x2021222324252627,
2233 0x3031323334353637,
2234 0x4041424344454647,
2235 0x5051525354555657,
2236 0x6061626364656667,
2237 0x7071727374757677,
2238 };
2239
2240 /* verify whether MMX is supported here */
2241 DPRINTF("Before invoking cpuid\n");
2242 {
2243 unsigned int eax, ebx, ecx, edx;
2244 if (!__get_cpuid(1, &eax, &ebx, &ecx, &edx))
2245 atf_tc_skip("CPUID is not supported by the CPU");
2246
2247 DPRINTF("cpuid: EDX = %08x\n", edx);
2248
2249 if (!(edx & bit_MMX))
2250 atf_tc_skip("MMX is not supported by the CPU");
2251 }
2252
2253 DPRINTF("Before forking process PID=%d\n", getpid());
2254 SYSCALL_REQUIRE((child = fork()) != -1);
2255 if (child == 0) {
2256 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
2257 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
2258
2259 DPRINTF("Before running assembly from child\n");
2260 set_mm_regs(mm);
2261
2262 DPRINTF("Before exiting of the child process\n");
2263 _exit(exitval);
2264 }
2265 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
2266
2267 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2268 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2269
2270 validate_status_stopped(status, sigval);
2271
2272 DPRINTF("Call GETFPREGS for the child process\n");
2273 SYSCALL_REQUIRE(ptrace(PT_GETFPREGS, child, &fpr, 0) != -1);
2274
2275 #if defined(__x86_64__)
2276 #define MM_REG(n) fpr.fxstate.fx_87_ac[n].r.f87_mantissa
2277 #else
2278 #define MM_REG(n) fpr.fstate.s87_ac[n].f87_mantissa
2279 #endif
2280
2281 ATF_CHECK_EQ(MM_REG(0), mm[0]);
2282 ATF_CHECK_EQ(MM_REG(1), mm[1]);
2283 ATF_CHECK_EQ(MM_REG(2), mm[2]);
2284 ATF_CHECK_EQ(MM_REG(3), mm[3]);
2285 ATF_CHECK_EQ(MM_REG(4), mm[4]);
2286 ATF_CHECK_EQ(MM_REG(5), mm[5]);
2287 ATF_CHECK_EQ(MM_REG(6), mm[6]);
2288 ATF_CHECK_EQ(MM_REG(7), mm[7]);
2289
2290 #undef MM_REG
2291
2292 DPRINTF("Before resuming the child process where it left off and "
2293 "without signal to be sent\n");
2294 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
2295
2296 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2297 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2298
2299 validate_status_exited(status, exitval);
2300
2301 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2302 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
2303 }
2304
2305 __attribute__((target("mmx")))
2306 static __inline void get_mm_regs(uint64_t v_mm[])
2307 {
2308 const uint64_t fill = 0x0F0F0F0F0F0F0F0F;
2309
2310 __asm__ __volatile__(
2311 /* fill registers with clobber pattern */
2312 "movq %1, %%mm0\n\t"
2313 "movq %1, %%mm1\n\t"
2314 "movq %1, %%mm2\n\t"
2315 "movq %1, %%mm3\n\t"
2316 "movq %1, %%mm4\n\t"
2317 "movq %1, %%mm5\n\t"
2318 "movq %1, %%mm6\n\t"
2319 "movq %1, %%mm7\n\t"
2320 "\n\t"
2321 "int3\n\t"
2322 "\n\t"
2323 "movq %%mm0, 0x00(%0)\n\t"
2324 "movq %%mm1, 0x08(%0)\n\t"
2325 "movq %%mm2, 0x10(%0)\n\t"
2326 "movq %%mm3, 0x18(%0)\n\t"
2327 "movq %%mm4, 0x20(%0)\n\t"
2328 "movq %%mm5, 0x28(%0)\n\t"
2329 "movq %%mm6, 0x30(%0)\n\t"
2330 "movq %%mm7, 0x38(%0)\n\t"
2331 :
2332 : "a"(v_mm), "m"(fill)
2333 : "%mm0", "%mm1", "%mm2", "%mm3", "%mm4", "%mm5", "%mm6", "%mm7"
2334 );
2335 }
2336
2337 ATF_TC(x86_regs_mm_write);
2338 ATF_TC_HEAD(x86_regs_mm_write, tc)
2339 {
2340 atf_tc_set_md_var(tc, "descr",
2341 "Set mm0..mm7 reg values into a debugged program via "
2342 "PT_SETFPREGS and compare the result against expected.");
2343 }
2344
2345 ATF_TC_BODY(x86_regs_mm_write, tc)
2346 {
2347 const int exitval = 5;
2348 pid_t child, wpid;
2349 #if defined(TWAIT_HAVE_STATUS)
2350 const int sigval = SIGTRAP;
2351 int status;
2352 #endif
2353 struct fpreg fpr;
2354
2355 const uint64_t mm[] = {
2356 0x0001020304050607,
2357 0x1011121314151617,
2358 0x2021222324252627,
2359 0x3031323334353637,
2360 0x4041424344454647,
2361 0x5051525354555657,
2362 0x6061626364656667,
2363 0x7071727374757677,
2364 };
2365
2366 /* verify whether MMX is supported here */
2367 DPRINTF("Before invoking cpuid\n");
2368 {
2369 unsigned int eax, ebx, ecx, edx;
2370 if (!__get_cpuid(1, &eax, &ebx, &ecx, &edx))
2371 atf_tc_skip("CPUID is not supported by the CPU");
2372
2373 DPRINTF("cpuid: EDX = %08x\n", edx);
2374
2375 if (!(edx & bit_MMX))
2376 atf_tc_skip("MMX is not supported by the CPU");
2377 }
2378
2379 DPRINTF("Before forking process PID=%d\n", getpid());
2380 SYSCALL_REQUIRE((child = fork()) != -1);
2381 if (child == 0) {
2382 uint64_t v_mm[8];
2383
2384 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
2385 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
2386
2387 DPRINTF("Before running assembly from child\n");
2388 get_mm_regs(v_mm);
2389
2390 DPRINTF("Before comparing results\n");
2391 FORKEE_ASSERT_EQ(v_mm[0], mm[0]);
2392 FORKEE_ASSERT_EQ(v_mm[1], mm[1]);
2393 FORKEE_ASSERT_EQ(v_mm[2], mm[2]);
2394 FORKEE_ASSERT_EQ(v_mm[3], mm[3]);
2395 FORKEE_ASSERT_EQ(v_mm[4], mm[4]);
2396 FORKEE_ASSERT_EQ(v_mm[5], mm[5]);
2397 FORKEE_ASSERT_EQ(v_mm[6], mm[6]);
2398 FORKEE_ASSERT_EQ(v_mm[7], mm[7]);
2399
2400 DPRINTF("Before exiting of the child process\n");
2401 _exit(exitval);
2402 }
2403 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
2404
2405 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2406 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2407
2408 validate_status_stopped(status, sigval);
2409
2410 DPRINTF("Call GETFPREGS for the child process\n");
2411 SYSCALL_REQUIRE(ptrace(PT_GETFPREGS, child, &fpr, 0) != -1);
2412
2413 #if defined(__x86_64__)
2414 #define MM_REG(n) fpr.fxstate.fx_87_ac[n].r.f87_mantissa
2415 #else
2416 #define MM_REG(n) fpr.fstate.s87_ac[n].f87_mantissa
2417 #endif
2418
2419 MM_REG(0) = mm[0];
2420 MM_REG(1) = mm[1];
2421 MM_REG(2) = mm[2];
2422 MM_REG(3) = mm[3];
2423 MM_REG(4) = mm[4];
2424 MM_REG(5) = mm[5];
2425 MM_REG(6) = mm[6];
2426 MM_REG(7) = mm[7];
2427
2428 #undef MM_REG
2429
2430 DPRINTF("Call SETFPREGS for the child process\n");
2431 SYSCALL_REQUIRE(ptrace(PT_SETFPREGS, child, &fpr, 0) != -1);
2432
2433 DPRINTF("Before resuming the child process where it left off and "
2434 "without signal to be sent\n");
2435 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
2436
2437 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2438 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2439
2440 validate_status_exited(status, exitval);
2441
2442 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2443 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
2444 }
2445
2446 __attribute__((target("sse")))
2447 static __inline void set_xmm_regs(const void* xmm)
2448 {
2449 __asm__ __volatile__(
2450 "movaps 0x00(%0), %%xmm0\n\t"
2451 "movaps 0x10(%0), %%xmm1\n\t"
2452 "movaps 0x20(%0), %%xmm2\n\t"
2453 "movaps 0x30(%0), %%xmm3\n\t"
2454 "movaps 0x40(%0), %%xmm4\n\t"
2455 "movaps 0x50(%0), %%xmm5\n\t"
2456 "movaps 0x60(%0), %%xmm6\n\t"
2457 "movaps 0x70(%0), %%xmm7\n\t"
2458 #if defined(__x86_64__)
2459 "movaps 0x80(%0), %%xmm8\n\t"
2460 "movaps 0x90(%0), %%xmm9\n\t"
2461 "movaps 0xA0(%0), %%xmm10\n\t"
2462 "movaps 0xB0(%0), %%xmm11\n\t"
2463 "movaps 0xC0(%0), %%xmm12\n\t"
2464 "movaps 0xD0(%0), %%xmm13\n\t"
2465 "movaps 0xE0(%0), %%xmm14\n\t"
2466 "movaps 0xF0(%0), %%xmm15\n\t"
2467 #endif
2468 "int3\n\t"
2469 :
2470 : "b"(xmm)
2471 : "%xmm0", "%xmm1", "%xmm2", "%xmm3", "%xmm4", "%xmm5", "%xmm6",
2472 "%xmm7"
2473 #if defined(__x86_64__)
2474 , "%xmm8", "%xmm9", "%xmm10", "%xmm11", "%xmm12", "%xmm13",
2475 "%xmm14", "%xmm15"
2476 #endif
2477 );
2478 }
2479
2480 ATF_TC(x86_regs_xmm_read);
2481 ATF_TC_HEAD(x86_regs_xmm_read, tc)
2482 {
2483 atf_tc_set_md_var(tc, "descr",
2484 "Set xmm0..xmm15 (..xmm7 on i386) reg values from debugged program "
2485 "and read them via PT_GETFPREGS (PT_GETXMMREGS on i386), comparing "
2486 "values against expected.");
2487 }
2488
2489 ATF_TC_BODY(x86_regs_xmm_read, tc)
2490 {
2491 const int exitval = 5;
2492 pid_t child, wpid;
2493 #if defined(TWAIT_HAVE_STATUS)
2494 const int sigval = SIGTRAP;
2495 int status;
2496 #endif
2497 #if defined(__x86_64__)
2498 struct fpreg fpr;
2499 #else
2500 struct xmmregs fpr;
2501 #endif
2502
2503 const struct {
2504 uint64_t a, b;
2505 } xmm[] __aligned(16) = {
2506 { 0x0706050403020100, 0x0F0E0D0C0B0A0908, },
2507 { 0x0807060504030201, 0x100F0E0D0C0B0A09, },
2508 { 0x0908070605040302, 0x11100F0E0D0C0B0A, },
2509 { 0x0A09080706050403, 0x1211100F0E0D0C0B, },
2510 { 0x0B0A090807060504, 0x131211100F0E0D0C, },
2511 { 0x0C0B0A0908070605, 0x14131211100F0E0D, },
2512 { 0x0D0C0B0A09080706, 0x1514131211100F0E, },
2513 { 0x0E0D0C0B0A090807, 0x161514131211100F, },
2514 #if defined(__x86_64__)
2515 { 0x0F0E0D0C0B0A0908, 0x1716151413121110, },
2516 { 0x100F0E0D0C0B0A09, 0x1817161514131211, },
2517 { 0x11100F0E0D0C0B0A, 0x1918171615141312, },
2518 { 0x1211100F0E0D0C0B, 0x1A19181716151413, },
2519 { 0x131211100F0E0D0C, 0x1B1A191817161514, },
2520 { 0x14131211100F0E0D, 0x1C1B1A1918171615, },
2521 { 0x1514131211100F0E, 0x1D1C1B1A19181716, },
2522 { 0x161514131211100F, 0x1E1D1C1B1A191817, },
2523 #endif
2524 };
2525
2526 /* verify whether SSE is supported here */
2527 DPRINTF("Before invoking cpuid\n");
2528 {
2529 unsigned int eax, ebx, ecx, edx;
2530 if (!__get_cpuid(1, &eax, &ebx, &ecx, &edx))
2531 atf_tc_skip("CPUID is not supported by the CPU");
2532
2533 DPRINTF("cpuid: EDX = %08x\n", edx);
2534
2535 if (!(edx & bit_SSE))
2536 atf_tc_skip("SSE is not supported by the CPU");
2537 }
2538
2539 DPRINTF("Before forking process PID=%d\n", getpid());
2540 SYSCALL_REQUIRE((child = fork()) != -1);
2541 if (child == 0) {
2542 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
2543 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
2544
2545 DPRINTF("Before running assembly from child\n");
2546 set_xmm_regs(xmm);
2547
2548 DPRINTF("Before exiting of the child process\n");
2549 _exit(exitval);
2550 }
2551 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
2552
2553 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2554 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2555
2556 validate_status_stopped(status, sigval);
2557
2558 #if defined(__x86_64__)
2559 DPRINTF("Call GETFPREGS for the child process\n");
2560 SYSCALL_REQUIRE(ptrace(PT_GETFPREGS, child, &fpr, 0) != -1);
2561 #else
2562 DPRINTF("Call GETXMMREGS for the child process\n");
2563 SYSCALL_REQUIRE(ptrace(PT_GETXMMREGS, child, &fpr, 0) != -1);
2564 #endif
2565
2566 ATF_CHECK(!memcmp(&fpr.fxstate.fx_xmm[0], &xmm[0], sizeof(*xmm)));
2567 ATF_CHECK(!memcmp(&fpr.fxstate.fx_xmm[1], &xmm[1], sizeof(*xmm)));
2568 ATF_CHECK(!memcmp(&fpr.fxstate.fx_xmm[2], &xmm[2], sizeof(*xmm)));
2569 ATF_CHECK(!memcmp(&fpr.fxstate.fx_xmm[3], &xmm[3], sizeof(*xmm)));
2570 ATF_CHECK(!memcmp(&fpr.fxstate.fx_xmm[4], &xmm[4], sizeof(*xmm)));
2571 ATF_CHECK(!memcmp(&fpr.fxstate.fx_xmm[5], &xmm[5], sizeof(*xmm)));
2572 ATF_CHECK(!memcmp(&fpr.fxstate.fx_xmm[6], &xmm[6], sizeof(*xmm)));
2573 ATF_CHECK(!memcmp(&fpr.fxstate.fx_xmm[7], &xmm[7], sizeof(*xmm)));
2574 #if defined(__x86_64__)
2575 ATF_CHECK(!memcmp(&fpr.fxstate.fx_xmm[8], &xmm[8], sizeof(*xmm)));
2576 ATF_CHECK(!memcmp(&fpr.fxstate.fx_xmm[9], &xmm[9], sizeof(*xmm)));
2577 ATF_CHECK(!memcmp(&fpr.fxstate.fx_xmm[10], &xmm[10], sizeof(*xmm)));
2578 ATF_CHECK(!memcmp(&fpr.fxstate.fx_xmm[11], &xmm[11], sizeof(*xmm)));
2579 ATF_CHECK(!memcmp(&fpr.fxstate.fx_xmm[12], &xmm[12], sizeof(*xmm)));
2580 ATF_CHECK(!memcmp(&fpr.fxstate.fx_xmm[13], &xmm[13], sizeof(*xmm)));
2581 ATF_CHECK(!memcmp(&fpr.fxstate.fx_xmm[14], &xmm[14], sizeof(*xmm)));
2582 ATF_CHECK(!memcmp(&fpr.fxstate.fx_xmm[15], &xmm[15], sizeof(*xmm)));
2583 #endif
2584
2585 DPRINTF("Before resuming the child process where it left off and "
2586 "without signal to be sent\n");
2587 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
2588
2589 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2590 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2591
2592 validate_status_exited(status, exitval);
2593
2594 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2595 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
2596 }
2597
2598 __attribute__((target("sse")))
2599 static __inline void get_xmm_regs(void* v_xmm)
2600 {
2601 const struct {
2602 uint64_t a, b;
2603 } fill __aligned(16) = {0x0F0F0F0F0F0F0F0F, 0x0F0F0F0F0F0F0F0F};
2604
2605 __asm__ __volatile__(
2606 /* fill registers with clobber pattern */
2607 "movaps %1, %%xmm0\n\t"
2608 "movaps %1, %%xmm1\n\t"
2609 "movaps %1, %%xmm2\n\t"
2610 "movaps %1, %%xmm3\n\t"
2611 "movaps %1, %%xmm4\n\t"
2612 "movaps %1, %%xmm5\n\t"
2613 "movaps %1, %%xmm6\n\t"
2614 "movaps %1, %%xmm7\n\t"
2615 #if defined(__x86_64__)
2616 "movaps %1, %%xmm8\n\t"
2617 "movaps %1, %%xmm9\n\t"
2618 "movaps %1, %%xmm10\n\t"
2619 "movaps %1, %%xmm11\n\t"
2620 "movaps %1, %%xmm12\n\t"
2621 "movaps %1, %%xmm13\n\t"
2622 "movaps %1, %%xmm14\n\t"
2623 "movaps %1, %%xmm15\n\t"
2624 #endif
2625 "\n\t"
2626 "int3\n\t"
2627 "\n\t"
2628 "movaps %%xmm0, 0x00(%0)\n\t"
2629 "movaps %%xmm1, 0x10(%0)\n\t"
2630 "movaps %%xmm2, 0x20(%0)\n\t"
2631 "movaps %%xmm3, 0x30(%0)\n\t"
2632 "movaps %%xmm4, 0x40(%0)\n\t"
2633 "movaps %%xmm5, 0x50(%0)\n\t"
2634 "movaps %%xmm6, 0x60(%0)\n\t"
2635 "movaps %%xmm7, 0x70(%0)\n\t"
2636 #if defined(__x86_64__)
2637 "movaps %%xmm8, 0x80(%0)\n\t"
2638 "movaps %%xmm9, 0x90(%0)\n\t"
2639 "movaps %%xmm10, 0xA0(%0)\n\t"
2640 "movaps %%xmm11, 0xB0(%0)\n\t"
2641 "movaps %%xmm12, 0xC0(%0)\n\t"
2642 "movaps %%xmm13, 0xD0(%0)\n\t"
2643 "movaps %%xmm14, 0xE0(%0)\n\t"
2644 "movaps %%xmm15, 0xF0(%0)\n\t"
2645 #endif
2646 :
2647 : "a"(v_xmm), "m"(fill)
2648 : "%xmm0", "%xmm1", "%xmm2", "%xmm3", "%xmm4", "%xmm5", "%xmm6", "%xmm7"
2649 #if defined(__x86_64__)
2650 , "%xmm8", "%xmm9", "%xmm10", "%xmm11", "%xmm12", "%xmm13", "%xmm14",
2651 "%xmm15"
2652 #endif
2653 );
2654 }
2655
2656 ATF_TC(x86_regs_xmm_write);
2657 ATF_TC_HEAD(x86_regs_xmm_write, tc)
2658 {
2659 atf_tc_set_md_var(tc, "descr",
2660 "Set xmm0..xmm15 (..xmm7 on i386) reg values into a debugged "
2661 "program via PT_SETFPREGS (PT_SETXMMREGS on i386) and compare "
2662 "the result against expected.");
2663 }
2664
2665 ATF_TC_BODY(x86_regs_xmm_write, tc)
2666 {
2667 const int exitval = 5;
2668 pid_t child, wpid;
2669 #if defined(TWAIT_HAVE_STATUS)
2670 const int sigval = SIGTRAP;
2671 int status;
2672 #endif
2673 #if defined(__x86_64__)
2674 struct fpreg fpr;
2675 #else
2676 struct xmmregs fpr;
2677 #endif
2678
2679 const struct {
2680 uint64_t a, b;
2681 } xmm[] __aligned(16) = {
2682 { 0x0706050403020100, 0x0F0E0D0C0B0A0908, },
2683 { 0x0807060504030201, 0x100F0E0D0C0B0A09, },
2684 { 0x0908070605040302, 0x11100F0E0D0C0B0A, },
2685 { 0x0A09080706050403, 0x1211100F0E0D0C0B, },
2686 { 0x0B0A090807060504, 0x131211100F0E0D0C, },
2687 { 0x0C0B0A0908070605, 0x14131211100F0E0D, },
2688 { 0x0D0C0B0A09080706, 0x1514131211100F0E, },
2689 { 0x0E0D0C0B0A090807, 0x161514131211100F, },
2690 #if defined(__x86_64__)
2691 { 0x0F0E0D0C0B0A0908, 0x1716151413121110, },
2692 { 0x100F0E0D0C0B0A09, 0x1817161514131211, },
2693 { 0x11100F0E0D0C0B0A, 0x1918171615141312, },
2694 { 0x1211100F0E0D0C0B, 0x1A19181716151413, },
2695 { 0x131211100F0E0D0C, 0x1B1A191817161514, },
2696 { 0x14131211100F0E0D, 0x1C1B1A1918171615, },
2697 { 0x1514131211100F0E, 0x1D1C1B1A19181716, },
2698 { 0x161514131211100F, 0x1E1D1C1B1A191817, },
2699 #endif
2700 };
2701
2702 /* verify whether SSE is supported here */
2703 DPRINTF("Before invoking cpuid\n");
2704 {
2705 unsigned int eax, ebx, ecx, edx;
2706 if (!__get_cpuid(1, &eax, &ebx, &ecx, &edx))
2707 atf_tc_skip("CPUID is not supported by the CPU");
2708
2709 DPRINTF("cpuid: EDX = %08x\n", edx);
2710
2711 if (!(edx & bit_SSE))
2712 atf_tc_skip("SSE is not supported by the CPU");
2713 }
2714
2715 DPRINTF("Before forking process PID=%d\n", getpid());
2716 SYSCALL_REQUIRE((child = fork()) != -1);
2717 if (child == 0) {
2718 struct {
2719 uint64_t a, b;
2720 } v_xmm[16] __aligned(16);
2721
2722 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
2723 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
2724
2725 DPRINTF("Before running assembly from child\n");
2726 get_xmm_regs(v_xmm);
2727
2728 DPRINTF("Before comparing results\n");
2729 FORKEE_ASSERT(!memcmp(&v_xmm[0], &xmm[0], sizeof(*xmm)));
2730 FORKEE_ASSERT(!memcmp(&v_xmm[1], &xmm[1], sizeof(*xmm)));
2731 FORKEE_ASSERT(!memcmp(&v_xmm[2], &xmm[2], sizeof(*xmm)));
2732 FORKEE_ASSERT(!memcmp(&v_xmm[3], &xmm[3], sizeof(*xmm)));
2733 FORKEE_ASSERT(!memcmp(&v_xmm[4], &xmm[4], sizeof(*xmm)));
2734 FORKEE_ASSERT(!memcmp(&v_xmm[5], &xmm[5], sizeof(*xmm)));
2735 FORKEE_ASSERT(!memcmp(&v_xmm[6], &xmm[6], sizeof(*xmm)));
2736 FORKEE_ASSERT(!memcmp(&v_xmm[7], &xmm[7], sizeof(*xmm)));
2737 #if defined(__x86_64__)
2738 FORKEE_ASSERT(!memcmp(&v_xmm[8], &xmm[8], sizeof(*xmm)));
2739 FORKEE_ASSERT(!memcmp(&v_xmm[9], &xmm[9], sizeof(*xmm)));
2740 FORKEE_ASSERT(!memcmp(&v_xmm[10], &xmm[10], sizeof(*xmm)));
2741 FORKEE_ASSERT(!memcmp(&v_xmm[11], &xmm[11], sizeof(*xmm)));
2742 FORKEE_ASSERT(!memcmp(&v_xmm[12], &xmm[12], sizeof(*xmm)));
2743 FORKEE_ASSERT(!memcmp(&v_xmm[13], &xmm[13], sizeof(*xmm)));
2744 FORKEE_ASSERT(!memcmp(&v_xmm[14], &xmm[14], sizeof(*xmm)));
2745 FORKEE_ASSERT(!memcmp(&v_xmm[15], &xmm[15], sizeof(*xmm)));
2746 #endif
2747
2748 DPRINTF("Before exiting of the child process\n");
2749 _exit(exitval);
2750 }
2751 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
2752
2753 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2754 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2755
2756 validate_status_stopped(status, sigval);
2757
2758 #if defined(__x86_64__)
2759 DPRINTF("Call GETFPREGS for the child process\n");
2760 SYSCALL_REQUIRE(ptrace(PT_GETFPREGS, child, &fpr, 0) != -1);
2761 #else
2762 DPRINTF("Call GETXMMREGS for the child process\n");
2763 SYSCALL_REQUIRE(ptrace(PT_GETXMMREGS, child, &fpr, 0) != -1);
2764 #endif
2765
2766 memcpy(&fpr.fxstate.fx_xmm[0], &xmm[0], sizeof(*xmm));
2767 memcpy(&fpr.fxstate.fx_xmm[1], &xmm[1], sizeof(*xmm));
2768 memcpy(&fpr.fxstate.fx_xmm[2], &xmm[2], sizeof(*xmm));
2769 memcpy(&fpr.fxstate.fx_xmm[3], &xmm[3], sizeof(*xmm));
2770 memcpy(&fpr.fxstate.fx_xmm[4], &xmm[4], sizeof(*xmm));
2771 memcpy(&fpr.fxstate.fx_xmm[5], &xmm[5], sizeof(*xmm));
2772 memcpy(&fpr.fxstate.fx_xmm[6], &xmm[6], sizeof(*xmm));
2773 memcpy(&fpr.fxstate.fx_xmm[7], &xmm[7], sizeof(*xmm));
2774 #if defined(__x86_64__)
2775 memcpy(&fpr.fxstate.fx_xmm[8], &xmm[8], sizeof(*xmm));
2776 memcpy(&fpr.fxstate.fx_xmm[9], &xmm[9], sizeof(*xmm));
2777 memcpy(&fpr.fxstate.fx_xmm[10], &xmm[10], sizeof(*xmm));
2778 memcpy(&fpr.fxstate.fx_xmm[11], &xmm[11], sizeof(*xmm));
2779 memcpy(&fpr.fxstate.fx_xmm[12], &xmm[12], sizeof(*xmm));
2780 memcpy(&fpr.fxstate.fx_xmm[13], &xmm[13], sizeof(*xmm));
2781 memcpy(&fpr.fxstate.fx_xmm[14], &xmm[14], sizeof(*xmm));
2782 memcpy(&fpr.fxstate.fx_xmm[15], &xmm[15], sizeof(*xmm));
2783 #endif
2784
2785 #if defined(__x86_64__)
2786 DPRINTF("Call SETFPREGS for the child process\n");
2787 SYSCALL_REQUIRE(ptrace(PT_SETFPREGS, child, &fpr, 0) != -1);
2788 #else
2789 DPRINTF("Call SETXMMREGS for the child process\n");
2790 SYSCALL_REQUIRE(ptrace(PT_SETXMMREGS, child, &fpr, 0) != -1);
2791 #endif
2792
2793 DPRINTF("Before resuming the child process where it left off and "
2794 "without signal to be sent\n");
2795 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
2796
2797 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2798 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2799
2800 validate_status_exited(status, exitval);
2801
2802 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2803 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
2804 }
2805 /// ----------------------------------------------------------------------------
2806
2807 #define ATF_TP_ADD_TCS_PTRACE_WAIT_X86() \
2808 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_print); \
2809 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr0); \
2810 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr1); \
2811 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr2); \
2812 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr3); \
2813 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr0_yield); \
2814 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr1_yield); \
2815 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr2_yield); \
2816 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr3_yield); \
2817 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr0_continued); \
2818 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr1_continued); \
2819 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr2_continued); \
2820 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr3_continued); \
2821 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_writeonly_byte); \
2822 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_writeonly_byte); \
2823 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_writeonly_byte); \
2824 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_writeonly_byte); \
2825 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_writeonly_2bytes); \
2826 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_writeonly_2bytes); \
2827 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_writeonly_2bytes); \
2828 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_writeonly_2bytes); \
2829 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_writeonly_4bytes); \
2830 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_writeonly_4bytes); \
2831 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_writeonly_4bytes); \
2832 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_writeonly_4bytes); \
2833 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_write_byte); \
2834 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_write_byte); \
2835 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_write_byte); \
2836 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_write_byte); \
2837 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_write_2bytes); \
2838 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_write_2bytes); \
2839 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_write_2bytes); \
2840 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_write_2bytes); \
2841 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_write_4bytes); \
2842 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_write_4bytes); \
2843 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_write_4bytes); \
2844 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_write_4bytes); \
2845 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_read_byte); \
2846 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_read_byte); \
2847 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_read_byte); \
2848 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_read_byte); \
2849 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_read_2bytes); \
2850 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_read_2bytes); \
2851 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_read_2bytes); \
2852 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_read_2bytes); \
2853 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_read_4bytes); \
2854 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_read_4bytes); \
2855 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_read_4bytes); \
2856 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_read_4bytes); \
2857 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_code); \
2858 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_code); \
2859 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_code); \
2860 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_code); \
2861 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_dont_inherit_lwp); \
2862 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_dont_inherit_lwp); \
2863 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_dont_inherit_lwp); \
2864 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_dont_inherit_lwp); \
2865 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_dont_inherit_execve); \
2866 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_dont_inherit_execve); \
2867 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_dont_inherit_execve); \
2868 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_dont_inherit_execve); \
2869 ATF_TP_ADD_TC_HAVE_DBREGS(tp, x86_cve_2018_8897); \
2870 ATF_TP_ADD_TC_HAVE_FPREGS(tp, x86_regs_mm_read); \
2871 ATF_TP_ADD_TC_HAVE_FPREGS(tp, x86_regs_mm_write); \
2872 ATF_TP_ADD_TC_HAVE_FPREGS(tp, x86_regs_xmm_read); \
2873 ATF_TP_ADD_TC_HAVE_FPREGS(tp, x86_regs_xmm_write);
2874 #else
2875 #define ATF_TP_ADD_TCS_PTRACE_WAIT_X86()
2876 #endif
2877