t_ptrace_x86_wait.h revision 1.8 1 /* $NetBSD: t_ptrace_x86_wait.h,v 1.8 2019/02/05 02:57:10 kamil Exp $ */
2
3 /*-
4 * Copyright (c) 2016 The NetBSD Foundation, Inc.
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 *
16 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
17 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
18 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
20 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
21 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
22 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
23 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
24 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
25 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
26 * POSSIBILITY OF SUCH DAMAGE.
27 */
28
29 #if defined(__i386__) || defined(__x86_64__)
30 union u {
31 unsigned long raw;
32 struct {
33 unsigned long local_dr0_breakpoint : 1; /* 0 */
34 unsigned long global_dr0_breakpoint : 1; /* 1 */
35 unsigned long local_dr1_breakpoint : 1; /* 2 */
36 unsigned long global_dr1_breakpoint : 1; /* 3 */
37 unsigned long local_dr2_breakpoint : 1; /* 4 */
38 unsigned long global_dr2_breakpoint : 1; /* 5 */
39 unsigned long local_dr3_breakpoint : 1; /* 6 */
40 unsigned long global_dr3_breakpoint : 1; /* 7 */
41 unsigned long local_exact_breakpt : 1; /* 8 */
42 unsigned long global_exact_breakpt : 1; /* 9 */
43 unsigned long reserved_10 : 1; /* 10 */
44 unsigned long rest_trans_memory : 1; /* 11 */
45 unsigned long reserved_12 : 1; /* 12 */
46 unsigned long general_detect_enable : 1; /* 13 */
47 unsigned long reserved_14 : 1; /* 14 */
48 unsigned long reserved_15 : 1; /* 15 */
49 unsigned long condition_dr0 : 2; /* 16-17 */
50 unsigned long len_dr0 : 2; /* 18-19 */
51 unsigned long condition_dr1 : 2; /* 20-21 */
52 unsigned long len_dr1 : 2; /* 22-23 */
53 unsigned long condition_dr2 : 2; /* 24-25 */
54 unsigned long len_dr2 : 2; /* 26-27 */
55 unsigned long condition_dr3 : 2; /* 28-29 */
56 unsigned long len_dr3 : 2; /* 30-31 */
57 } bits;
58 };
59
60 ATF_TC(dbregs_print);
61 ATF_TC_HEAD(dbregs_print, tc)
62 {
63 atf_tc_set_md_var(tc, "descr",
64 "Verify plain PT_GETDBREGS with printing Debug Registers");
65 }
66
67 ATF_TC_BODY(dbregs_print, tc)
68 {
69 const int exitval = 5;
70 const int sigval = SIGSTOP;
71 pid_t child, wpid;
72 #if defined(TWAIT_HAVE_STATUS)
73 int status;
74 #endif
75 struct dbreg r;
76 size_t i;
77
78 DPRINTF("Before forking process PID=%d\n", getpid());
79 SYSCALL_REQUIRE((child = fork()) != -1);
80 if (child == 0) {
81 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
82 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
83
84 DPRINTF("Before raising %s from child\n", strsignal(sigval));
85 FORKEE_ASSERT(raise(sigval) == 0);
86
87 DPRINTF("Before exiting of the child process\n");
88 _exit(exitval);
89 }
90 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
91
92 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
93 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
94
95 validate_status_stopped(status, sigval);
96
97 DPRINTF("Call GETDBREGS for the child process\n");
98 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r, 0) != -1);
99
100 DPRINTF("State of the debug registers:\n");
101 for (i = 0; i < __arraycount(r.dr); i++)
102 DPRINTF("r[%zu]=%" PRIxREGISTER "\n", i, r.dr[i]);
103
104 DPRINTF("Before resuming the child process where it left off and "
105 "without signal to be sent\n");
106 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
107
108 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
109 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
110
111 validate_status_exited(status, exitval);
112
113 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
114 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
115 }
116
117
118 enum dbreg_preserve_mode {
119 dbreg_preserve_mode_none,
120 dbreg_preserve_mode_yield,
121 dbreg_preserve_mode_continued
122 };
123
124 static void
125 dbreg_preserve(int reg, enum dbreg_preserve_mode mode)
126 {
127 const int exitval = 5;
128 const int sigval = SIGSTOP;
129 pid_t child, wpid;
130 #if defined(TWAIT_HAVE_STATUS)
131 int status;
132 #endif
133 struct dbreg r1;
134 struct dbreg r2;
135 size_t i;
136 int watchme;
137
138 if (!can_we_set_dbregs()) {
139 atf_tc_skip("Either run this test as root or set sysctl(3) "
140 "security.models.extensions.user_set_dbregs to 1");
141 }
142
143 DPRINTF("Before forking process PID=%d\n", getpid());
144 SYSCALL_REQUIRE((child = fork()) != -1);
145 if (child == 0) {
146 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
147 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
148
149 DPRINTF("Before raising %s from child\n", strsignal(sigval));
150 FORKEE_ASSERT(raise(sigval) == 0);
151
152 if (mode == dbreg_preserve_mode_continued) {
153 DPRINTF("Before raising %s from child\n",
154 strsignal(sigval));
155 FORKEE_ASSERT(raise(sigval) == 0);
156 }
157
158 DPRINTF("Before exiting of the child process\n");
159 _exit(exitval);
160 }
161 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
162
163 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
164 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
165
166 validate_status_stopped(status, sigval);
167
168 DPRINTF("Call GETDBREGS for the child process (r1)\n");
169 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
170
171 DPRINTF("State of the debug registers (r1):\n");
172 for (i = 0; i < __arraycount(r1.dr); i++)
173 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
174
175 r1.dr[reg] = (long)(intptr_t)&watchme;
176 DPRINTF("Set DR0 (r1.dr[%d]) to new value %" PRIxREGISTER "\n",
177 reg, r1.dr[reg]);
178
179 DPRINTF("New state of the debug registers (r1):\n");
180 for (i = 0; i < __arraycount(r1.dr); i++)
181 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
182
183 DPRINTF("Call SETDBREGS for the child process (r1)\n");
184 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
185
186 switch (mode) {
187 case dbreg_preserve_mode_none:
188 break;
189 case dbreg_preserve_mode_yield:
190 DPRINTF("Yields a processor voluntarily and gives other "
191 "threads a chance to run without waiting for an "
192 "involuntary preemptive switch\n");
193 sched_yield();
194 break;
195 case dbreg_preserve_mode_continued:
196 DPRINTF("Call CONTINUE for the child process\n");
197 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
198
199 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
200 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
201
202 validate_status_stopped(status, sigval);
203 break;
204 }
205
206 DPRINTF("Call GETDBREGS for the child process (r2)\n");
207 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r2, 0) != -1);
208
209 DPRINTF("Assert that (r1) and (r2) are the same\n");
210 SYSCALL_REQUIRE(memcmp(&r1, &r2, sizeof(r1)) == 0);
211
212 DPRINTF("Before resuming the child process where it left off and "
213 "without signal to be sent\n");
214 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
215
216 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
217 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
218
219 validate_status_exited(status, exitval);
220
221 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
222 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
223 }
224
225
226 ATF_TC(dbregs_preserve_dr0);
227 ATF_TC_HEAD(dbregs_preserve_dr0, tc)
228 {
229 atf_tc_set_md_var(tc, "descr",
230 "Verify that setting DR0 is preserved across ptrace(2) calls");
231 }
232
233 ATF_TC_BODY(dbregs_preserve_dr0, tc)
234 {
235 dbreg_preserve(0, dbreg_preserve_mode_none);
236 }
237
238 ATF_TC(dbregs_preserve_dr1);
239 ATF_TC_HEAD(dbregs_preserve_dr1, tc)
240 {
241 atf_tc_set_md_var(tc, "descr",
242 "Verify that setting DR1 is preserved across ptrace(2) calls");
243 }
244
245 ATF_TC_BODY(dbregs_preserve_dr1, tc)
246 {
247 dbreg_preserve(1, dbreg_preserve_mode_none);
248 }
249
250 ATF_TC(dbregs_preserve_dr2);
251 ATF_TC_HEAD(dbregs_preserve_dr2, tc)
252 {
253 atf_tc_set_md_var(tc, "descr",
254 "Verify that setting DR2 is preserved across ptrace(2) calls");
255 }
256
257 ATF_TC_BODY(dbregs_preserve_dr2, tc)
258 {
259 dbreg_preserve(2, dbreg_preserve_mode_none);
260 }
261
262 ATF_TC(dbregs_preserve_dr3);
263 ATF_TC_HEAD(dbregs_preserve_dr3, tc)
264 {
265 atf_tc_set_md_var(tc, "descr",
266 "Verify that setting DR3 is preserved across ptrace(2) calls");
267 }
268
269 ATF_TC_BODY(dbregs_preserve_dr3, tc)
270 {
271 dbreg_preserve(3, dbreg_preserve_mode_none);
272 }
273
274 ATF_TC(dbregs_preserve_dr0_yield);
275 ATF_TC_HEAD(dbregs_preserve_dr0_yield, tc)
276 {
277 atf_tc_set_md_var(tc, "descr",
278 "Verify that setting DR0 is preserved across ptrace(2) calls with "
279 "scheduler yield");
280 }
281
282 ATF_TC_BODY(dbregs_preserve_dr0_yield, tc)
283 {
284 dbreg_preserve(0, dbreg_preserve_mode_yield);
285 }
286
287 ATF_TC(dbregs_preserve_dr1_yield);
288 ATF_TC_HEAD(dbregs_preserve_dr1_yield, tc)
289 {
290 atf_tc_set_md_var(tc, "descr",
291 "Verify that setting DR1 is preserved across ptrace(2) calls with "
292 "scheduler yield");
293 }
294
295 ATF_TC_BODY(dbregs_preserve_dr1_yield, tc)
296 {
297 dbreg_preserve(0, dbreg_preserve_mode_yield);
298 }
299
300 ATF_TC(dbregs_preserve_dr2_yield);
301 ATF_TC_HEAD(dbregs_preserve_dr2_yield, tc)
302 {
303 atf_tc_set_md_var(tc, "descr",
304 "Verify that setting DR2 is preserved across ptrace(2) calls with "
305 "scheduler yield");
306 }
307
308 ATF_TC_BODY(dbregs_preserve_dr2_yield, tc)
309 {
310 dbreg_preserve(0, dbreg_preserve_mode_yield);
311 }
312
313
314 ATF_TC(dbregs_preserve_dr3_yield);
315 ATF_TC_HEAD(dbregs_preserve_dr3_yield, tc)
316 {
317 atf_tc_set_md_var(tc, "descr",
318 "Verify that setting DR3 is preserved across ptrace(2) calls with "
319 "scheduler yield");
320 }
321
322 ATF_TC_BODY(dbregs_preserve_dr3_yield, tc)
323 {
324 dbreg_preserve(3, dbreg_preserve_mode_yield);
325 }
326
327 ATF_TC(dbregs_preserve_dr0_continued);
328 ATF_TC_HEAD(dbregs_preserve_dr0_continued, tc)
329 {
330 atf_tc_set_md_var(tc, "descr",
331 "Verify that setting DR0 is preserved across ptrace(2) calls and "
332 "with continued child");
333 }
334
335 ATF_TC_BODY(dbregs_preserve_dr0_continued, tc)
336 {
337 dbreg_preserve(0, dbreg_preserve_mode_continued);
338 }
339
340 ATF_TC(dbregs_preserve_dr1_continued);
341 ATF_TC_HEAD(dbregs_preserve_dr1_continued, tc)
342 {
343 atf_tc_set_md_var(tc, "descr",
344 "Verify that setting DR1 is preserved across ptrace(2) calls and "
345 "with continued child");
346 }
347
348 ATF_TC_BODY(dbregs_preserve_dr1_continued, tc)
349 {
350 dbreg_preserve(1, dbreg_preserve_mode_continued);
351 }
352
353 ATF_TC(dbregs_preserve_dr2_continued);
354 ATF_TC_HEAD(dbregs_preserve_dr2_continued, tc)
355 {
356 atf_tc_set_md_var(tc, "descr",
357 "Verify that setting DR2 is preserved across ptrace(2) calls and "
358 "with continued child");
359 }
360
361 ATF_TC_BODY(dbregs_preserve_dr2_continued, tc)
362 {
363 dbreg_preserve(2, dbreg_preserve_mode_continued);
364 }
365
366 ATF_TC(dbregs_preserve_dr3_continued);
367 ATF_TC_HEAD(dbregs_preserve_dr3_continued, tc)
368 {
369 atf_tc_set_md_var(tc, "descr",
370 "Verify that setting DR3 is preserved across ptrace(2) calls and "
371 "with continued child");
372 }
373
374 ATF_TC_BODY(dbregs_preserve_dr3_continued, tc)
375 {
376 dbreg_preserve(3, dbreg_preserve_mode_continued);
377 }
378
379
380 static void
381 dbregs_trap_variable(int reg, int cond, int len, bool write)
382 {
383 const int exitval = 5;
384 const int sigval = SIGSTOP;
385 pid_t child, wpid;
386 #if defined(TWAIT_HAVE_STATUS)
387 int status;
388 #endif
389 struct dbreg r1;
390 size_t i;
391 volatile int watchme = 0;
392 union u dr7;
393
394 struct ptrace_siginfo info;
395 memset(&info, 0, sizeof(info));
396
397 if (!can_we_set_dbregs()) {
398 atf_tc_skip("Either run this test as root or set sysctl(3) "
399 "security.models.extensions.user_set_dbregs to 1");
400 }
401
402 dr7.raw = 0;
403 switch (reg) {
404 case 0:
405 dr7.bits.global_dr0_breakpoint = 1;
406 dr7.bits.condition_dr0 = cond;
407 dr7.bits.len_dr0 = len;
408 break;
409 case 1:
410 dr7.bits.global_dr1_breakpoint = 1;
411 dr7.bits.condition_dr1 = cond;
412 dr7.bits.len_dr1 = len;
413 break;
414 case 2:
415 dr7.bits.global_dr2_breakpoint = 1;
416 dr7.bits.condition_dr2 = cond;
417 dr7.bits.len_dr2 = len;
418 break;
419 case 3:
420 dr7.bits.global_dr3_breakpoint = 1;
421 dr7.bits.condition_dr3 = cond;
422 dr7.bits.len_dr3 = len;
423 break;
424 }
425
426 DPRINTF("Before forking process PID=%d\n", getpid());
427 SYSCALL_REQUIRE((child = fork()) != -1);
428 if (child == 0) {
429 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
430 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
431
432 DPRINTF("Before raising %s from child\n", strsignal(sigval));
433 FORKEE_ASSERT(raise(sigval) == 0);
434
435 if (write)
436 watchme = 1;
437 else
438 printf("watchme=%d\n", watchme);
439
440 DPRINTF("Before raising %s from child\n", strsignal(sigval));
441 FORKEE_ASSERT(raise(sigval) == 0);
442
443 DPRINTF("Before exiting of the child process\n");
444 _exit(exitval);
445 }
446 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
447
448 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
449 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
450
451 validate_status_stopped(status, sigval);
452
453 DPRINTF("Call GETDBREGS for the child process (r1)\n");
454 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
455
456 DPRINTF("State of the debug registers (r1):\n");
457 for (i = 0; i < __arraycount(r1.dr); i++)
458 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
459
460 r1.dr[reg] = (long)(intptr_t)&watchme;
461 DPRINTF("Set DR%d (r1.dr[%d]) to new value %" PRIxREGISTER "\n",
462 reg, reg, r1.dr[reg]);
463
464 r1.dr[7] = dr7.raw;
465 DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
466 r1.dr[7]);
467
468 DPRINTF("New state of the debug registers (r1):\n");
469 for (i = 0; i < __arraycount(r1.dr); i++)
470 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
471
472 DPRINTF("Call SETDBREGS for the child process (r1)\n");
473 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
474
475 DPRINTF("Call CONTINUE for the child process\n");
476 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
477
478 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
479 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
480
481 validate_status_stopped(status, SIGTRAP);
482
483 DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
484 SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
485
486 DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
487 DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
488 info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
489 info.psi_siginfo.si_errno);
490
491 DPRINTF("Before checking siginfo_t\n");
492 ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, SIGTRAP);
493 ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_DBREG);
494
495 DPRINTF("Call CONTINUE for the child process\n");
496 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
497
498 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
499 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
500
501 validate_status_stopped(status, sigval);
502
503 DPRINTF("Before resuming the child process where it left off and "
504 "without signal to be sent\n");
505 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
506
507 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
508 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
509
510 validate_status_exited(status, exitval);
511
512 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
513 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
514 }
515
516 ATF_TC(dbregs_dr0_trap_variable_writeonly_byte);
517 ATF_TC_HEAD(dbregs_dr0_trap_variable_writeonly_byte, tc)
518 {
519 atf_tc_set_md_var(tc, "descr",
520 "Verify that setting trap with DR0 triggers SIGTRAP "
521 "(break on data writes only and 1 byte mode)");
522 }
523
524 ATF_TC_BODY(dbregs_dr0_trap_variable_writeonly_byte, tc)
525 {
526 /* 0b01 -- break on data write only */
527 /* 0b00 -- 1 byte */
528
529 dbregs_trap_variable(0, 1, 0, true);
530 }
531
532 ATF_TC(dbregs_dr1_trap_variable_writeonly_byte);
533 ATF_TC_HEAD(dbregs_dr1_trap_variable_writeonly_byte, tc)
534 {
535 atf_tc_set_md_var(tc, "descr",
536 "Verify that setting trap with DR1 triggers SIGTRAP "
537 "(break on data writes only and 1 byte mode)");
538 }
539
540 ATF_TC_BODY(dbregs_dr1_trap_variable_writeonly_byte, tc)
541 {
542 /* 0b01 -- break on data write only */
543 /* 0b00 -- 1 byte */
544
545 dbregs_trap_variable(1, 1, 0, true);
546 }
547
548 ATF_TC(dbregs_dr2_trap_variable_writeonly_byte);
549 ATF_TC_HEAD(dbregs_dr2_trap_variable_writeonly_byte, tc)
550 {
551 atf_tc_set_md_var(tc, "descr",
552 "Verify that setting trap with DR2 triggers SIGTRAP "
553 "(break on data writes only and 1 byte mode)");
554 }
555
556 ATF_TC_BODY(dbregs_dr2_trap_variable_writeonly_byte, tc)
557 {
558 /* 0b01 -- break on data write only */
559 /* 0b00 -- 1 byte */
560
561 dbregs_trap_variable(2, 1, 0, true);
562 }
563
564 ATF_TC(dbregs_dr3_trap_variable_writeonly_byte);
565 ATF_TC_HEAD(dbregs_dr3_trap_variable_writeonly_byte, tc)
566 {
567 atf_tc_set_md_var(tc, "descr",
568 "Verify that setting trap with DR3 triggers SIGTRAP "
569 "(break on data writes only and 1 byte mode)");
570 }
571
572 ATF_TC_BODY(dbregs_dr3_trap_variable_writeonly_byte, tc)
573 {
574 /* 0b01 -- break on data write only */
575 /* 0b00 -- 1 byte */
576
577 dbregs_trap_variable(3, 1, 0, true);
578 }
579
580 ATF_TC(dbregs_dr0_trap_variable_writeonly_2bytes);
581 ATF_TC_HEAD(dbregs_dr0_trap_variable_writeonly_2bytes, tc)
582 {
583 atf_tc_set_md_var(tc, "descr",
584 "Verify that setting trap with DR0 triggers SIGTRAP "
585 "(break on data writes only and 2 bytes mode)");
586 }
587
588 ATF_TC_BODY(dbregs_dr0_trap_variable_writeonly_2bytes, tc)
589 {
590 /* 0b01 -- break on data write only */
591 /* 0b01 -- 2 bytes */
592
593 dbregs_trap_variable(0, 1, 1, true);
594 }
595
596 ATF_TC(dbregs_dr1_trap_variable_writeonly_2bytes);
597 ATF_TC_HEAD(dbregs_dr1_trap_variable_writeonly_2bytes, tc)
598 {
599 atf_tc_set_md_var(tc, "descr",
600 "Verify that setting trap with DR1 triggers SIGTRAP "
601 "(break on data writes only and 2 bytes mode)");
602 }
603
604 ATF_TC_BODY(dbregs_dr1_trap_variable_writeonly_2bytes, tc)
605 {
606 /* 0b01 -- break on data write only */
607 /* 0b01 -- 2 bytes */
608
609 dbregs_trap_variable(1, 1, 1, true);
610 }
611
612 ATF_TC(dbregs_dr2_trap_variable_writeonly_2bytes);
613 ATF_TC_HEAD(dbregs_dr2_trap_variable_writeonly_2bytes, tc)
614 {
615 atf_tc_set_md_var(tc, "descr",
616 "Verify that setting trap with DR2 triggers SIGTRAP "
617 "(break on data writes only and 2 bytes mode)");
618 }
619
620 ATF_TC_BODY(dbregs_dr2_trap_variable_writeonly_2bytes, tc)
621 {
622 /* 0b01 -- break on data write only */
623 /* 0b01 -- 2 bytes */
624
625 dbregs_trap_variable(2, 1, 1, true);
626 }
627
628 ATF_TC(dbregs_dr3_trap_variable_writeonly_2bytes);
629 ATF_TC_HEAD(dbregs_dr3_trap_variable_writeonly_2bytes, tc)
630 {
631 atf_tc_set_md_var(tc, "descr",
632 "Verify that setting trap with DR3 triggers SIGTRAP "
633 "(break on data writes only and 2 bytes mode)");
634 }
635
636 ATF_TC_BODY(dbregs_dr3_trap_variable_writeonly_2bytes, tc)
637 {
638 /* 0b01 -- break on data write only */
639 /* 0b01 -- 2 bytes */
640
641 dbregs_trap_variable(3, 1, 1, true);
642 }
643
644 ATF_TC(dbregs_dr0_trap_variable_writeonly_4bytes);
645 ATF_TC_HEAD(dbregs_dr0_trap_variable_writeonly_4bytes, tc)
646 {
647 atf_tc_set_md_var(tc, "descr",
648 "Verify that setting trap with DR0 triggers SIGTRAP "
649 "(break on data writes only and 4 bytes mode)");
650 }
651
652 ATF_TC_BODY(dbregs_dr0_trap_variable_writeonly_4bytes, tc)
653 {
654 /* 0b01 -- break on data write only */
655 /* 0b11 -- 4 bytes */
656
657 dbregs_trap_variable(0, 1, 3, true);
658 }
659
660 ATF_TC(dbregs_dr1_trap_variable_writeonly_4bytes);
661 ATF_TC_HEAD(dbregs_dr1_trap_variable_writeonly_4bytes, tc)
662 {
663 atf_tc_set_md_var(tc, "descr",
664 "Verify that setting trap with DR1 triggers SIGTRAP "
665 "(break on data writes only and 4 bytes mode)");
666 }
667
668 ATF_TC_BODY(dbregs_dr1_trap_variable_writeonly_4bytes, tc)
669 {
670 /* 0b01 -- break on data write only */
671 /* 0b11 -- 4 bytes */
672
673 dbregs_trap_variable(1, 1, 3, true);
674 }
675
676 ATF_TC(dbregs_dr2_trap_variable_writeonly_4bytes);
677 ATF_TC_HEAD(dbregs_dr2_trap_variable_writeonly_4bytes, tc)
678 {
679 atf_tc_set_md_var(tc, "descr",
680 "Verify that setting trap with DR2 triggers SIGTRAP "
681 "(break on data writes only and 4 bytes mode)");
682 }
683
684 ATF_TC_BODY(dbregs_dr2_trap_variable_writeonly_4bytes, tc)
685 {
686 /* 0b01 -- break on data write only */
687 /* 0b11 -- 4 bytes */
688
689 dbregs_trap_variable(2, 1, 3, true);
690 }
691
692 ATF_TC(dbregs_dr3_trap_variable_writeonly_4bytes);
693 ATF_TC_HEAD(dbregs_dr3_trap_variable_writeonly_4bytes, tc)
694 {
695 atf_tc_set_md_var(tc, "descr",
696 "Verify that setting trap with DR3 triggers SIGTRAP "
697 "(break on data writes only and 4 bytes mode)");
698 }
699
700 ATF_TC_BODY(dbregs_dr3_trap_variable_writeonly_4bytes, tc)
701 {
702 /* 0b01 -- break on data write only */
703 /* 0b11 -- 4 bytes */
704
705 dbregs_trap_variable(3, 1, 3, true);
706 }
707
708 ATF_TC(dbregs_dr0_trap_variable_readwrite_write_byte);
709 ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_write_byte, tc)
710 {
711 atf_tc_set_md_var(tc, "descr",
712 "Verify that setting trap with DR0 triggers SIGTRAP "
713 "(break on data read/write trap in read 1 byte mode)");
714 }
715
716 ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_write_byte, tc)
717 {
718 /* 0b11 -- break on data write&read */
719 /* 0b00 -- 1 byte */
720
721 dbregs_trap_variable(0, 3, 0, true);
722 }
723
724 ATF_TC(dbregs_dr1_trap_variable_readwrite_write_byte);
725 ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_write_byte, tc)
726 {
727 atf_tc_set_md_var(tc, "descr",
728 "Verify that setting trap with DR1 triggers SIGTRAP "
729 "(break on data read/write trap in read 1 byte mode)");
730 }
731
732 ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_write_byte, tc)
733 {
734 /* 0b11 -- break on data write&read */
735 /* 0b00 -- 1 byte */
736
737 dbregs_trap_variable(1, 3, 0, true);
738 }
739
740 ATF_TC(dbregs_dr2_trap_variable_readwrite_write_byte);
741 ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_write_byte, tc)
742 {
743 atf_tc_set_md_var(tc, "descr",
744 "Verify that setting trap with DR2 triggers SIGTRAP "
745 "(break on data read/write trap in read 1 byte mode)");
746 }
747
748 ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_write_byte, tc)
749 {
750 /* 0b11 -- break on data write&read */
751 /* 0b00 -- 1 byte */
752
753 dbregs_trap_variable(2, 3, 0, true);
754 }
755
756 ATF_TC(dbregs_dr3_trap_variable_readwrite_write_byte);
757 ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_write_byte, tc)
758 {
759 atf_tc_set_md_var(tc, "descr",
760 "Verify that setting trap with DR3 triggers SIGTRAP "
761 "(break on data read/write trap in read 1 byte mode)");
762 }
763
764 ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_write_byte, tc)
765 {
766 /* 0b11 -- break on data write&read */
767 /* 0b00 -- 1 byte */
768
769 dbregs_trap_variable(3, 3, 0, true);
770 }
771
772 ATF_TC(dbregs_dr0_trap_variable_readwrite_write_2bytes);
773 ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_write_2bytes, tc)
774 {
775 atf_tc_set_md_var(tc, "descr",
776 "Verify that setting trap with DR0 triggers SIGTRAP "
777 "(break on data read/write trap in read 2 bytes mode)");
778 }
779
780 ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_write_2bytes, tc)
781 {
782 /* 0b11 -- break on data write&read */
783 /* 0b01 -- 2 bytes */
784
785 dbregs_trap_variable(0, 3, 1, true);
786 }
787
788 ATF_TC(dbregs_dr1_trap_variable_readwrite_write_2bytes);
789 ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_write_2bytes, tc)
790 {
791 atf_tc_set_md_var(tc, "descr",
792 "Verify that setting trap with DR1 triggers SIGTRAP "
793 "(break on data read/write trap in read 2 bytes mode)");
794 }
795
796 ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_write_2bytes, tc)
797 {
798 /* 0b11 -- break on data write&read */
799 /* 0b01 -- 2 bytes */
800
801 dbregs_trap_variable(1, 3, 1, true);
802 }
803
804 ATF_TC(dbregs_dr2_trap_variable_readwrite_write_2bytes);
805 ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_write_2bytes, tc)
806 {
807 atf_tc_set_md_var(tc, "descr",
808 "Verify that setting trap with DR2 triggers SIGTRAP "
809 "(break on data read/write trap in read 2 bytes mode)");
810 }
811
812 ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_write_2bytes, tc)
813 {
814 /* 0b11 -- break on data write&read */
815 /* 0b01 -- 2 bytes */
816
817 dbregs_trap_variable(2, 3, 1, true);
818 }
819
820 ATF_TC(dbregs_dr3_trap_variable_readwrite_write_2bytes);
821 ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_write_2bytes, tc)
822 {
823 atf_tc_set_md_var(tc, "descr",
824 "Verify that setting trap with DR3 triggers SIGTRAP "
825 "(break on data read/write trap in read 2 bytes mode)");
826 }
827
828 ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_write_2bytes, tc)
829 {
830 /* 0b11 -- break on data write&read */
831 /* 0b01 -- 2 bytes */
832
833 dbregs_trap_variable(3, 3, 1, true);
834 }
835
836 ATF_TC(dbregs_dr0_trap_variable_readwrite_write_4bytes);
837 ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_write_4bytes, tc)
838 {
839 atf_tc_set_md_var(tc, "descr",
840 "Verify that setting trap with DR0 triggers SIGTRAP "
841 "(break on data read/write trap in read 4 bytes mode)");
842 }
843
844 ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_write_4bytes, tc)
845 {
846 /* 0b11 -- break on data write&read */
847 /* 0b11 -- 4 bytes */
848
849 dbregs_trap_variable(0, 3, 3, true);
850 }
851
852 ATF_TC(dbregs_dr1_trap_variable_readwrite_write_4bytes);
853 ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_write_4bytes, tc)
854 {
855 atf_tc_set_md_var(tc, "descr",
856 "Verify that setting trap with DR1 triggers SIGTRAP "
857 "(break on data read/write trap in read 4 bytes mode)");
858 }
859
860 ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_write_4bytes, tc)
861 {
862 /* 0b11 -- break on data write&read */
863 /* 0b11 -- 4 bytes */
864
865 dbregs_trap_variable(1, 3, 3, true);
866 }
867
868 ATF_TC(dbregs_dr2_trap_variable_readwrite_write_4bytes);
869 ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_write_4bytes, tc)
870 {
871 atf_tc_set_md_var(tc, "descr",
872 "Verify that setting trap with DR2 triggers SIGTRAP "
873 "(break on data read/write trap in read 4 bytes mode)");
874 }
875
876 ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_write_4bytes, tc)
877 {
878 /* 0b11 -- break on data write&read */
879 /* 0b11 -- 4 bytes */
880
881 dbregs_trap_variable(2, 3, 3, true);
882 }
883
884 ATF_TC(dbregs_dr3_trap_variable_readwrite_write_4bytes);
885 ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_write_4bytes, tc)
886 {
887 atf_tc_set_md_var(tc, "descr",
888 "Verify that setting trap with DR3 triggers SIGTRAP "
889 "(break on data read/write trap in read 4 bytes mode)");
890 }
891
892 ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_write_4bytes, tc)
893 {
894 /* 0b11 -- break on data write&read */
895 /* 0b11 -- 4 bytes */
896
897 dbregs_trap_variable(3, 3, 3, true);
898 }
899
900 ATF_TC(dbregs_dr0_trap_variable_readwrite_read_byte);
901 ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_read_byte, tc)
902 {
903 atf_tc_set_md_var(tc, "descr",
904 "Verify that setting trap with DR0 triggers SIGTRAP "
905 "(break on data read/write trap in write 1 byte mode)");
906 }
907
908 ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_read_byte, tc)
909 {
910 /* 0b11 -- break on data write&read */
911 /* 0b00 -- 1 byte */
912
913 dbregs_trap_variable(0, 3, 0, false);
914 }
915
916 ATF_TC(dbregs_dr1_trap_variable_readwrite_read_byte);
917 ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_read_byte, tc)
918 {
919 atf_tc_set_md_var(tc, "descr",
920 "Verify that setting trap with DR1 triggers SIGTRAP "
921 "(break on data read/write trap in write 1 byte mode)");
922 }
923
924 ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_read_byte, tc)
925 {
926 /* 0b11 -- break on data write&read */
927 /* 0b00 -- 1 byte */
928
929 dbregs_trap_variable(1, 3, 0, false);
930 }
931
932 ATF_TC(dbregs_dr2_trap_variable_readwrite_read_byte);
933 ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_read_byte, tc)
934 {
935 atf_tc_set_md_var(tc, "descr",
936 "Verify that setting trap with DR2 triggers SIGTRAP "
937 "(break on data read/write trap in write 1 byte mode)");
938 }
939
940 ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_read_byte, tc)
941 {
942 /* 0b11 -- break on data write&read */
943 /* 0b00 -- 1 byte */
944
945 dbregs_trap_variable(2, 3, 0, false);
946 }
947
948 ATF_TC(dbregs_dr3_trap_variable_readwrite_read_byte);
949 ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_read_byte, tc)
950 {
951 atf_tc_set_md_var(tc, "descr",
952 "Verify that setting trap with DR3 triggers SIGTRAP "
953 "(break on data read/write trap in write 1 byte mode)");
954 }
955
956 ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_read_byte, tc)
957 {
958 /* 0b11 -- break on data write&read */
959 /* 0b00 -- 1 byte */
960
961 dbregs_trap_variable(3, 3, 0, false);
962 }
963
964 ATF_TC(dbregs_dr0_trap_variable_readwrite_read_2bytes);
965 ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_read_2bytes, tc)
966 {
967 atf_tc_set_md_var(tc, "descr",
968 "Verify that setting trap with DR0 triggers SIGTRAP "
969 "(break on data read/write trap in write 2 bytes mode)");
970 }
971
972 ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_read_2bytes, tc)
973 {
974 /* 0b11 -- break on data write&read */
975 /* 0b01 -- 2 bytes */
976
977 dbregs_trap_variable(0, 3, 1, false);
978 }
979
980 ATF_TC(dbregs_dr1_trap_variable_readwrite_read_2bytes);
981 ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_read_2bytes, tc)
982 {
983 atf_tc_set_md_var(tc, "descr",
984 "Verify that setting trap with DR1 triggers SIGTRAP "
985 "(break on data read/write trap in write 2 bytes mode)");
986 }
987
988 ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_read_2bytes, tc)
989 {
990 /* 0b11 -- break on data write&read */
991 /* 0b01 -- 2 bytes */
992
993 dbregs_trap_variable(1, 3, 1, false);
994 }
995
996 ATF_TC(dbregs_dr2_trap_variable_readwrite_read_2bytes);
997 ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_read_2bytes, tc)
998 {
999 atf_tc_set_md_var(tc, "descr",
1000 "Verify that setting trap with DR2 triggers SIGTRAP "
1001 "(break on data read/write trap in write 2 bytes mode)");
1002 }
1003
1004 ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_read_2bytes, tc)
1005 {
1006 /* 0b11 -- break on data write&read */
1007 /* 0b01 -- 2 bytes */
1008
1009 dbregs_trap_variable(2, 3, 1, false);
1010 }
1011
1012 ATF_TC(dbregs_dr3_trap_variable_readwrite_read_2bytes);
1013 ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_read_2bytes, tc)
1014 {
1015 atf_tc_set_md_var(tc, "descr",
1016 "Verify that setting trap with DR3 triggers SIGTRAP "
1017 "(break on data read/write trap in write 2 bytes mode)");
1018 }
1019
1020 ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_read_2bytes, tc)
1021 {
1022 /* 0b11 -- break on data write&read */
1023 /* 0b01 -- 2 bytes */
1024
1025 dbregs_trap_variable(3, 3, 1, false);
1026 }
1027
1028 ATF_TC(dbregs_dr0_trap_variable_readwrite_read_4bytes);
1029 ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_read_4bytes, tc)
1030 {
1031 atf_tc_set_md_var(tc, "descr",
1032 "Verify that setting trap with DR0 triggers SIGTRAP "
1033 "(break on data read/write trap in write 4 bytes mode)");
1034 }
1035
1036 ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_read_4bytes, tc)
1037 {
1038 /* 0b11 -- break on data write&read */
1039 /* 0b11 -- 4 bytes */
1040
1041 dbregs_trap_variable(0, 3, 3, false);
1042 }
1043
1044 ATF_TC(dbregs_dr1_trap_variable_readwrite_read_4bytes);
1045 ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_read_4bytes, tc)
1046 {
1047 atf_tc_set_md_var(tc, "descr",
1048 "Verify that setting trap with DR1 triggers SIGTRAP "
1049 "(break on data read/write trap in write 4 bytes mode)");
1050 }
1051
1052 ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_read_4bytes, tc)
1053 {
1054 /* 0b11 -- break on data write&read */
1055 /* 0b11 -- 4 bytes */
1056
1057 dbregs_trap_variable(1, 3, 3, false);
1058 }
1059
1060 ATF_TC(dbregs_dr2_trap_variable_readwrite_read_4bytes);
1061 ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_read_4bytes, tc)
1062 {
1063 atf_tc_set_md_var(tc, "descr",
1064 "Verify that setting trap with DR2 triggers SIGTRAP "
1065 "(break on data read/write trap in write 4 bytes mode)");
1066 }
1067
1068 ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_read_4bytes, tc)
1069 {
1070 /* 0b11 -- break on data write&read */
1071 /* 0b11 -- 4 bytes */
1072
1073 dbregs_trap_variable(2, 3, 3, false);
1074 }
1075
1076 ATF_TC(dbregs_dr3_trap_variable_readwrite_read_4bytes);
1077 ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_read_4bytes, tc)
1078 {
1079 atf_tc_set_md_var(tc, "descr",
1080 "Verify that setting trap with DR3 triggers SIGTRAP "
1081 "(break on data read/write trap in write 4 bytes mode)");
1082 }
1083
1084 ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_read_4bytes, tc)
1085 {
1086 /* 0b11 -- break on data write&read */
1087 /* 0b11 -- 4 bytes */
1088
1089 dbregs_trap_variable(3, 3, 3, false);
1090 }
1091
1092 #if defined(HAVE_DBREGS)
1093 ATF_TC(dbregs_dr0_trap_code);
1094 ATF_TC_HEAD(dbregs_dr0_trap_code, tc)
1095 {
1096 atf_tc_set_md_var(tc, "descr",
1097 "Verify that setting trap with DR0 triggers SIGTRAP "
1098 "(break on code execution trap)");
1099 }
1100
1101 ATF_TC_BODY(dbregs_dr0_trap_code, tc)
1102 {
1103 const int exitval = 5;
1104 const int sigval = SIGSTOP;
1105 pid_t child, wpid;
1106 #if defined(TWAIT_HAVE_STATUS)
1107 int status;
1108 #endif
1109 struct dbreg r1;
1110 size_t i;
1111 volatile int watchme = 1;
1112 union u dr7;
1113
1114 struct ptrace_siginfo info;
1115 memset(&info, 0, sizeof(info));
1116
1117 if (!can_we_set_dbregs()) {
1118 atf_tc_skip("Either run this test as root or set sysctl(3) "
1119 "security.models.extensions.user_set_dbregs to 1");
1120 }
1121
1122 dr7.raw = 0;
1123 dr7.bits.global_dr0_breakpoint = 1;
1124 dr7.bits.condition_dr0 = 0; /* 0b00 -- break on code execution */
1125 dr7.bits.len_dr0 = 0; /* 0b00 -- 1 byte */
1126
1127 DPRINTF("Before forking process PID=%d\n", getpid());
1128 SYSCALL_REQUIRE((child = fork()) != -1);
1129 if (child == 0) {
1130 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1131 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1132
1133 DPRINTF("Before raising %s from child\n", strsignal(sigval));
1134 FORKEE_ASSERT(raise(sigval) == 0);
1135
1136 printf("check_happy(%d)=%d\n", watchme, check_happy(watchme));
1137
1138 DPRINTF("Before raising %s from child\n", strsignal(sigval));
1139 FORKEE_ASSERT(raise(sigval) == 0);
1140
1141 DPRINTF("Before exiting of the child process\n");
1142 _exit(exitval);
1143 }
1144 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1145
1146 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1147 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1148
1149 validate_status_stopped(status, sigval);
1150
1151 DPRINTF("Call GETDBREGS for the child process (r1)\n");
1152 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1153
1154 DPRINTF("State of the debug registers (r1):\n");
1155 for (i = 0; i < __arraycount(r1.dr); i++)
1156 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1157
1158 r1.dr[0] = (long)(intptr_t)check_happy;
1159 DPRINTF("Set DR0 (r1.dr[0]) to new value %" PRIxREGISTER "\n",
1160 r1.dr[0]);
1161
1162 r1.dr[7] = dr7.raw;
1163 DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1164 r1.dr[7]);
1165
1166 DPRINTF("New state of the debug registers (r1):\n");
1167 for (i = 0; i < __arraycount(r1.dr); i++)
1168 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1169
1170 DPRINTF("Call SETDBREGS for the child process (r1)\n");
1171 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1172
1173 DPRINTF("Call CONTINUE for the child process\n");
1174 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1175
1176 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1177 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1178
1179 validate_status_stopped(status, SIGTRAP);
1180
1181 DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
1182 SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
1183
1184 DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
1185 DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
1186 info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
1187 info.psi_siginfo.si_errno);
1188
1189 DPRINTF("Before checking siginfo_t\n");
1190 ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, SIGTRAP);
1191 ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_DBREG);
1192
1193 DPRINTF("Remove code trap from check_happy=%p\n", check_happy);
1194 dr7.bits.global_dr0_breakpoint = 0;
1195 r1.dr[7] = dr7.raw;
1196 DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1197 r1.dr[7]);
1198
1199 DPRINTF("Call SETDBREGS for the child process (r1)\n");
1200 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1201
1202 DPRINTF("Call CONTINUE for the child process\n");
1203 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1204
1205 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1206 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1207
1208 validate_status_stopped(status, sigval);
1209
1210 DPRINTF("Before resuming the child process where it left off and "
1211 "without signal to be sent\n");
1212 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1213
1214 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1215 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1216
1217 validate_status_exited(status, exitval);
1218
1219 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1220 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1221 }
1222 #endif
1223
1224 #if defined(HAVE_DBREGS)
1225 ATF_TC(dbregs_dr1_trap_code);
1226 ATF_TC_HEAD(dbregs_dr1_trap_code, tc)
1227 {
1228 atf_tc_set_md_var(tc, "descr",
1229 "Verify that setting trap with DR1 triggers SIGTRAP "
1230 "(break on code execution trap)");
1231 }
1232
1233 ATF_TC_BODY(dbregs_dr1_trap_code, tc)
1234 {
1235 const int exitval = 5;
1236 const int sigval = SIGSTOP;
1237 pid_t child, wpid;
1238 #if defined(TWAIT_HAVE_STATUS)
1239 int status;
1240 #endif
1241 struct dbreg r1;
1242 size_t i;
1243 volatile int watchme = 1;
1244 union u dr7;
1245
1246 struct ptrace_siginfo info;
1247 memset(&info, 0, sizeof(info));
1248
1249 if (!can_we_set_dbregs()) {
1250 atf_tc_skip("Either run this test as root or set sysctl(3) "
1251 "security.models.extensions.user_set_dbregs to 1");
1252 }
1253
1254 dr7.raw = 0;
1255 dr7.bits.global_dr1_breakpoint = 1;
1256 dr7.bits.condition_dr1 = 0; /* 0b00 -- break on code execution */
1257 dr7.bits.len_dr1 = 0; /* 0b00 -- 1 byte */
1258
1259 DPRINTF("Before forking process PID=%d\n", getpid());
1260 SYSCALL_REQUIRE((child = fork()) != -1);
1261 if (child == 0) {
1262 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1263 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1264
1265 DPRINTF("Before raising %s from child\n", strsignal(sigval));
1266 FORKEE_ASSERT(raise(sigval) == 0);
1267
1268 printf("check_happy(%d)=%d\n", watchme, check_happy(watchme));
1269
1270 DPRINTF("Before raising %s from child\n", strsignal(sigval));
1271 FORKEE_ASSERT(raise(sigval) == 0);
1272
1273 DPRINTF("Before exiting of the child process\n");
1274 _exit(exitval);
1275 }
1276 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1277
1278 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1279 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1280
1281 validate_status_stopped(status, sigval);
1282
1283 DPRINTF("Call GETDBREGS for the child process (r1)\n");
1284 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1285
1286 DPRINTF("State of the debug registers (r1):\n");
1287 for (i = 0; i < __arraycount(r1.dr); i++)
1288 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1289
1290 r1.dr[1] = (long)(intptr_t)check_happy;
1291 DPRINTF("Set DR1 (r1.dr[1]) to new value %" PRIxREGISTER "\n",
1292 r1.dr[1]);
1293
1294 r1.dr[7] = dr7.raw;
1295 DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1296 r1.dr[7]);
1297
1298 DPRINTF("New state of the debug registers (r1):\n");
1299 for (i = 0; i < __arraycount(r1.dr); i++)
1300 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1301
1302 DPRINTF("Call SETDBREGS for the child process (r1)\n");
1303 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1304
1305 DPRINTF("Call CONTINUE for the child process\n");
1306 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1307
1308 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1309 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1310
1311 validate_status_stopped(status, SIGTRAP);
1312
1313 DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
1314 SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
1315
1316 DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
1317 DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
1318 info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
1319 info.psi_siginfo.si_errno);
1320
1321 DPRINTF("Before checking siginfo_t\n");
1322 ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, SIGTRAP);
1323 ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_DBREG);
1324
1325 DPRINTF("Remove code trap from check_happy=%p\n", check_happy);
1326 dr7.bits.global_dr1_breakpoint = 0;
1327 r1.dr[7] = dr7.raw;
1328 DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1329 r1.dr[7]);
1330
1331 DPRINTF("Call SETDBREGS for the child process (r1)\n");
1332 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1333
1334 DPRINTF("Call CONTINUE for the child process\n");
1335 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1336
1337 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1338 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1339
1340 validate_status_stopped(status, sigval);
1341
1342 DPRINTF("Before resuming the child process where it left off and "
1343 "without signal to be sent\n");
1344 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1345
1346 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1347 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1348
1349 validate_status_exited(status, exitval);
1350
1351 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1352 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1353 }
1354 #endif
1355
1356 #if defined(HAVE_DBREGS)
1357 ATF_TC(dbregs_dr2_trap_code);
1358 ATF_TC_HEAD(dbregs_dr2_trap_code, tc)
1359 {
1360 atf_tc_set_md_var(tc, "descr",
1361 "Verify that setting trap with DR2 triggers SIGTRAP "
1362 "(break on code execution trap)");
1363 }
1364
1365 ATF_TC_BODY(dbregs_dr2_trap_code, tc)
1366 {
1367 const int exitval = 5;
1368 const int sigval = SIGSTOP;
1369 pid_t child, wpid;
1370 #if defined(TWAIT_HAVE_STATUS)
1371 int status;
1372 #endif
1373 struct dbreg r1;
1374 size_t i;
1375 volatile int watchme = 1;
1376 union u dr7;
1377
1378 struct ptrace_siginfo info;
1379 memset(&info, 0, sizeof(info));
1380
1381 if (!can_we_set_dbregs()) {
1382 atf_tc_skip("Either run this test as root or set sysctl(3) "
1383 "security.models.extensions.user_set_dbregs to 1");
1384 }
1385
1386 dr7.raw = 0;
1387 dr7.bits.global_dr2_breakpoint = 1;
1388 dr7.bits.condition_dr2 = 0; /* 0b00 -- break on code execution */
1389 dr7.bits.len_dr2 = 0; /* 0b00 -- 1 byte */
1390
1391 DPRINTF("Before forking process PID=%d\n", getpid());
1392 SYSCALL_REQUIRE((child = fork()) != -1);
1393 if (child == 0) {
1394 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1395 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1396
1397 DPRINTF("Before raising %s from child\n", strsignal(sigval));
1398 FORKEE_ASSERT(raise(sigval) == 0);
1399
1400 printf("check_happy(%d)=%d\n", watchme, check_happy(watchme));
1401
1402 DPRINTF("Before raising %s from child\n", strsignal(sigval));
1403 FORKEE_ASSERT(raise(sigval) == 0);
1404
1405 DPRINTF("Before exiting of the child process\n");
1406 _exit(exitval);
1407 }
1408 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1409
1410 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1411 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1412
1413 validate_status_stopped(status, sigval);
1414
1415 DPRINTF("Call GETDBREGS for the child process (r1)\n");
1416 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1417
1418 DPRINTF("State of the debug registers (r1):\n");
1419 for (i = 0; i < __arraycount(r1.dr); i++)
1420 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1421
1422 r1.dr[2] = (long)(intptr_t)check_happy;
1423 DPRINTF("Set DR2 (r1.dr[2]) to new value %" PRIxREGISTER "\n",
1424 r1.dr[2]);
1425
1426 r1.dr[7] = dr7.raw;
1427 DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1428 r1.dr[7]);
1429
1430 DPRINTF("New state of the debug registers (r1):\n");
1431 for (i = 0; i < __arraycount(r1.dr); i++)
1432 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1433
1434 DPRINTF("Call SETDBREGS for the child process (r1)\n");
1435 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1436
1437 DPRINTF("Call CONTINUE for the child process\n");
1438 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1439
1440 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1441 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1442
1443 validate_status_stopped(status, SIGTRAP);
1444
1445 DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
1446 SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
1447
1448 DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
1449 DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
1450 info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
1451 info.psi_siginfo.si_errno);
1452
1453 DPRINTF("Before checking siginfo_t\n");
1454 ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, SIGTRAP);
1455 ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_DBREG);
1456
1457 DPRINTF("Remove code trap from check_happy=%p\n", check_happy);
1458 dr7.bits.global_dr2_breakpoint = 0;
1459 r1.dr[7] = dr7.raw;
1460 DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1461 r1.dr[7]);
1462
1463 DPRINTF("Call SETDBREGS for the child process (r1)\n");
1464 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1465
1466 DPRINTF("Call CONTINUE for the child process\n");
1467 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1468
1469 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1470 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1471
1472 validate_status_stopped(status, sigval);
1473
1474 DPRINTF("Before resuming the child process where it left off and "
1475 "without signal to be sent\n");
1476 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1477
1478 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1479 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1480
1481 validate_status_exited(status, exitval);
1482
1483 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1484 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1485 }
1486 #endif
1487
1488 #if defined(HAVE_DBREGS)
1489 ATF_TC(dbregs_dr3_trap_code);
1490 ATF_TC_HEAD(dbregs_dr3_trap_code, tc)
1491 {
1492 atf_tc_set_md_var(tc, "descr",
1493 "Verify that setting trap with DR3 triggers SIGTRAP "
1494 "(break on code execution trap)");
1495 }
1496
1497 ATF_TC_BODY(dbregs_dr3_trap_code, tc)
1498 {
1499 const int exitval = 5;
1500 const int sigval = SIGSTOP;
1501 pid_t child, wpid;
1502 #if defined(TWAIT_HAVE_STATUS)
1503 int status;
1504 #endif
1505 struct dbreg r1;
1506 size_t i;
1507 volatile int watchme = 1;
1508 union u dr7;
1509
1510 struct ptrace_siginfo info;
1511 memset(&info, 0, sizeof(info));
1512
1513 if (!can_we_set_dbregs()) {
1514 atf_tc_skip("Either run this test as root or set sysctl(3) "
1515 "security.models.extensions.user_set_dbregs to 1");
1516 }
1517
1518 dr7.raw = 0;
1519 dr7.bits.global_dr3_breakpoint = 1;
1520 dr7.bits.condition_dr3 = 0; /* 0b00 -- break on code execution */
1521 dr7.bits.len_dr3 = 0; /* 0b00 -- 1 byte */
1522
1523 DPRINTF("Before forking process PID=%d\n", getpid());
1524 SYSCALL_REQUIRE((child = fork()) != -1);
1525 if (child == 0) {
1526 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1527 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1528
1529 DPRINTF("Before raising %s from child\n", strsignal(sigval));
1530 FORKEE_ASSERT(raise(sigval) == 0);
1531
1532 printf("check_happy(%d)=%d\n", watchme, check_happy(watchme));
1533
1534 DPRINTF("Before raising %s from child\n", strsignal(sigval));
1535 FORKEE_ASSERT(raise(sigval) == 0);
1536
1537 DPRINTF("Before exiting of the child process\n");
1538 _exit(exitval);
1539 }
1540 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1541
1542 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1543 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1544
1545 validate_status_stopped(status, sigval);
1546
1547 DPRINTF("Call GETDBREGS for the child process (r1)\n");
1548 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1549
1550 DPRINTF("State of the debug registers (r1):\n");
1551 for (i = 0; i < __arraycount(r1.dr); i++)
1552 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1553
1554 r1.dr[3] = (long)(intptr_t)check_happy;
1555 DPRINTF("Set DR3 (r1.dr[3]) to new value %" PRIxREGISTER "\n",
1556 r1.dr[3]);
1557
1558 r1.dr[7] = dr7.raw;
1559 DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1560 r1.dr[7]);
1561
1562 DPRINTF("New state of the debug registers (r1):\n");
1563 for (i = 0; i < __arraycount(r1.dr); i++)
1564 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1565
1566 DPRINTF("Call SETDBREGS for the child process (r1)\n");
1567 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1568
1569 DPRINTF("Call CONTINUE for the child process\n");
1570 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1571
1572 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1573 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1574
1575 validate_status_stopped(status, SIGTRAP);
1576
1577 DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
1578 SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
1579
1580 DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
1581 DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
1582 info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
1583 info.psi_siginfo.si_errno);
1584
1585 DPRINTF("Before checking siginfo_t\n");
1586 ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, SIGTRAP);
1587 ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_DBREG);
1588
1589 DPRINTF("Remove code trap from check_happy=%p\n", check_happy);
1590 dr7.bits.global_dr3_breakpoint = 0;
1591 r1.dr[7] = dr7.raw;
1592 DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1593 r1.dr[7]);
1594
1595 DPRINTF("Call SETDBREGS for the child process (r1)\n");
1596 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1597
1598 DPRINTF("Call CONTINUE for the child process\n");
1599 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1600
1601 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1602 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1603
1604 validate_status_stopped(status, sigval);
1605
1606 DPRINTF("Before resuming the child process where it left off and "
1607 "without signal to be sent\n");
1608 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1609
1610 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1611 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1612
1613 validate_status_exited(status, exitval);
1614
1615 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1616 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1617 }
1618 #endif
1619
1620 volatile lwpid_t x86_the_lwp_id = 0;
1621
1622 static void __used
1623 x86_lwp_main_func(void *arg)
1624 {
1625 x86_the_lwp_id = _lwp_self();
1626 _lwp_exit();
1627 }
1628
1629 static void
1630 dbregs_dont_inherit_lwp(int reg)
1631 {
1632 const int exitval = 5;
1633 const int sigval = SIGSTOP;
1634 pid_t child, wpid;
1635 #if defined(TWAIT_HAVE_STATUS)
1636 int status;
1637 #endif
1638 ptrace_state_t state;
1639 const int slen = sizeof(state);
1640 ptrace_event_t event;
1641 const int elen = sizeof(event);
1642 ucontext_t uc;
1643 lwpid_t lid;
1644 static const size_t ssize = 16*1024;
1645 void *stack;
1646 size_t i;
1647 struct dbreg r1;
1648 struct dbreg r2;
1649
1650 if (!can_we_set_dbregs()) {
1651 atf_tc_skip("Either run this test as root or set sysctl(3) "
1652 "security.models.extensions.user_set_dbregs to 1");
1653 }
1654
1655 DPRINTF("Before forking process PID=%d\n", getpid());
1656 SYSCALL_REQUIRE((child = fork()) != -1);
1657 if (child == 0) {
1658 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1659 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1660
1661 DPRINTF("Before raising %s from child\n", strsignal(sigval));
1662 FORKEE_ASSERT(raise(sigval) == 0);
1663
1664 DPRINTF("Before allocating memory for stack in child\n");
1665 FORKEE_ASSERT((stack = malloc(ssize)) != NULL);
1666
1667 DPRINTF("Before making context for new lwp in child\n");
1668 _lwp_makecontext(&uc, x86_lwp_main_func, NULL, NULL, stack,
1669 ssize);
1670
1671 DPRINTF("Before creating new in child\n");
1672 FORKEE_ASSERT(_lwp_create(&uc, 0, &lid) == 0);
1673
1674 DPRINTF("Before waiting for lwp %d to exit\n", lid);
1675 FORKEE_ASSERT(_lwp_wait(lid, NULL) == 0);
1676
1677 DPRINTF("Before verifying that reported %d and running lid %d "
1678 "are the same\n", lid, x86_the_lwp_id);
1679 FORKEE_ASSERT_EQ(lid, x86_the_lwp_id);
1680
1681 DPRINTF("Before exiting of the child process\n");
1682 _exit(exitval);
1683 }
1684 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1685
1686 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1687 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1688
1689 validate_status_stopped(status, sigval);
1690
1691 DPRINTF("Set empty EVENT_MASK for the child %d\n", child);
1692 event.pe_set_event = PTRACE_LWP_CREATE;
1693 SYSCALL_REQUIRE(ptrace(PT_SET_EVENT_MASK, child, &event, elen) != -1);
1694
1695 DPRINTF("Call GETDBREGS for the child process (r1)\n");
1696 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1697
1698 DPRINTF("State of the debug registers (r1):\n");
1699 for (i = 0; i < __arraycount(r1.dr); i++)
1700 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1701
1702 r1.dr[reg] = (long)(intptr_t)check_happy;
1703 DPRINTF("Set DR%d (r1.dr[%d]) to new value %" PRIxREGISTER "\n",
1704 reg, reg, r1.dr[0]);
1705
1706 DPRINTF("New state of the debug registers (r1):\n");
1707 for (i = 0; i < __arraycount(r1.dr); i++)
1708 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1709
1710 DPRINTF("Call SETDBREGS for the child process (r1)\n");
1711 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1712
1713 DPRINTF("Before resuming the child process where it left off and "
1714 "without signal to be sent\n");
1715 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1716
1717 DPRINTF("Before calling %s() for the child - expected stopped "
1718 "SIGTRAP\n", TWAIT_FNAME);
1719 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1720
1721 validate_status_stopped(status, SIGTRAP);
1722
1723 SYSCALL_REQUIRE(ptrace(PT_GET_PROCESS_STATE, child, &state, slen) != -1);
1724
1725 ATF_REQUIRE_EQ(state.pe_report_event, PTRACE_LWP_CREATE);
1726
1727 lid = state.pe_lwp;
1728 DPRINTF("Reported PTRACE_LWP_CREATE event with lid %d\n", lid);
1729
1730 DPRINTF("Call GETDBREGS for the child process new lwp (r2)\n");
1731 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r2, lid) != -1);
1732
1733 DPRINTF("State of the debug registers (r2):\n");
1734 for (i = 0; i < __arraycount(r2.dr); i++)
1735 DPRINTF("r2[%zu]=%" PRIxREGISTER "\n", i, r2.dr[i]);
1736
1737 DPRINTF("Assert that (r1) and (r2) are not the same\n");
1738 ATF_REQUIRE(memcmp(&r1, &r2, sizeof(r1)) != 0);
1739
1740 DPRINTF("Before resuming the child process where it left off and "
1741 "without signal to be sent\n");
1742 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1743
1744 DPRINTF("Before calling %s() for the child - expected exited\n",
1745 TWAIT_FNAME);
1746 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1747
1748 validate_status_exited(status, exitval);
1749
1750 DPRINTF("Before calling %s() for the child - expected no process\n",
1751 TWAIT_FNAME);
1752 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1753 }
1754
1755 ATF_TC(dbregs_dr0_dont_inherit_lwp);
1756 ATF_TC_HEAD(dbregs_dr0_dont_inherit_lwp, tc)
1757 {
1758 atf_tc_set_md_var(tc, "descr",
1759 "Verify that 1 LWP creation is intercepted by ptrace(2) with "
1760 "EVENT_MASK set to PTRACE_LWP_CREATE and Debug Register 0 from "
1761 "the forker thread is not inherited");
1762 }
1763
1764 ATF_TC_BODY(dbregs_dr0_dont_inherit_lwp, tc)
1765 {
1766 dbregs_dont_inherit_lwp(0);
1767 }
1768
1769 ATF_TC(dbregs_dr1_dont_inherit_lwp);
1770 ATF_TC_HEAD(dbregs_dr1_dont_inherit_lwp, tc)
1771 {
1772 atf_tc_set_md_var(tc, "descr",
1773 "Verify that 1 LWP creation is intercepted by ptrace(2) with "
1774 "EVENT_MASK set to PTRACE_LWP_CREATE and Debug Register 1 from "
1775 "the forker thread is not inherited");
1776 }
1777
1778 ATF_TC_BODY(dbregs_dr1_dont_inherit_lwp, tc)
1779 {
1780 dbregs_dont_inherit_lwp(1);
1781 }
1782
1783 ATF_TC(dbregs_dr2_dont_inherit_lwp);
1784 ATF_TC_HEAD(dbregs_dr2_dont_inherit_lwp, tc)
1785 {
1786 atf_tc_set_md_var(tc, "descr",
1787 "Verify that 1 LWP creation is intercepted by ptrace(2) with "
1788 "EVENT_MASK set to PTRACE_LWP_CREATE and Debug Register 2 from "
1789 "the forker thread is not inherited");
1790 }
1791
1792 ATF_TC_BODY(dbregs_dr2_dont_inherit_lwp, tc)
1793 {
1794 dbregs_dont_inherit_lwp(2);
1795 }
1796
1797 ATF_TC(dbregs_dr3_dont_inherit_lwp);
1798 ATF_TC_HEAD(dbregs_dr3_dont_inherit_lwp, tc)
1799 {
1800 atf_tc_set_md_var(tc, "descr",
1801 "Verify that 1 LWP creation is intercepted by ptrace(2) with "
1802 "EVENT_MASK set to PTRACE_LWP_CREATE and Debug Register 3 from "
1803 "the forker thread is not inherited");
1804 }
1805
1806 ATF_TC_BODY(dbregs_dr3_dont_inherit_lwp, tc)
1807 {
1808 dbregs_dont_inherit_lwp(3);
1809 }
1810
1811 static void
1812 dbregs_dont_inherit_execve(int reg)
1813 {
1814 const int sigval = SIGTRAP;
1815 pid_t child, wpid;
1816 #if defined(TWAIT_HAVE_STATUS)
1817 int status;
1818 #endif
1819 size_t i;
1820 struct dbreg r1;
1821 struct dbreg r2;
1822
1823 struct ptrace_siginfo info;
1824 memset(&info, 0, sizeof(info));
1825
1826 if (!can_we_set_dbregs()) {
1827 atf_tc_skip("Either run this test as root or set sysctl(3) "
1828 "security.models.extensions.user_set_dbregs to 1");
1829 }
1830
1831 DPRINTF("Before forking process PID=%d\n", getpid());
1832 SYSCALL_REQUIRE((child = fork()) != -1);
1833 if (child == 0) {
1834 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1835 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1836
1837 DPRINTF("Before raising %s from child\n", strsignal(sigval));
1838 FORKEE_ASSERT(raise(sigval) == 0);
1839
1840 DPRINTF("Before calling execve(2) from child\n");
1841 execlp("/bin/echo", "/bin/echo", NULL);
1842
1843 FORKEE_ASSERT(0 && "Not reached");
1844 }
1845 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1846
1847 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1848 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1849
1850 validate_status_stopped(status, sigval);
1851
1852 DPRINTF("Call GETDBREGS for the child process (r1)\n");
1853 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1854
1855 DPRINTF("State of the debug registers (r1):\n");
1856 for (i = 0; i < __arraycount(r1.dr); i++)
1857 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1858
1859 r1.dr[reg] = (long)(intptr_t)check_happy;
1860 DPRINTF("Set DR%d (r1.dr[%d]) to new value %" PRIxREGISTER "\n",
1861 reg, reg, r1.dr[reg]);
1862
1863 DPRINTF("New state of the debug registers (r1):\n");
1864 for (i = 0; i < __arraycount(r1.dr); i++)
1865 DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1866
1867 DPRINTF("Call SETDBREGS for the child process (r1)\n");
1868 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1869
1870 DPRINTF("Before resuming the child process where it left off and "
1871 "without signal to be sent\n");
1872 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1873
1874 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1875 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1876
1877 validate_status_stopped(status, sigval);
1878
1879 DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
1880 SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
1881
1882 DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
1883 DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
1884 info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
1885 info.psi_siginfo.si_errno);
1886
1887 ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, sigval);
1888 ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_EXEC);
1889
1890 DPRINTF("Call GETDBREGS for the child process after execve(2)\n");
1891 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r2, 0) != -1);
1892
1893 DPRINTF("State of the debug registers (r2):\n");
1894 for (i = 0; i < __arraycount(r2.dr); i++)
1895 DPRINTF("r2[%zu]=%" PRIxREGISTER "\n", i, r2.dr[i]);
1896
1897 DPRINTF("Assert that (r1) and (r2) are not the same\n");
1898 ATF_REQUIRE(memcmp(&r1, &r2, sizeof(r1)) != 0);
1899
1900 DPRINTF("Before resuming the child process where it left off and "
1901 "without signal to be sent\n");
1902 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1903
1904 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1905 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1906
1907 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1908 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1909 }
1910
1911 ATF_TC(dbregs_dr0_dont_inherit_execve);
1912 ATF_TC_HEAD(dbregs_dr0_dont_inherit_execve, tc)
1913 {
1914 atf_tc_set_md_var(tc, "descr",
1915 "Verify that execve(2) is intercepted by tracer and Debug "
1916 "Register 0 is reset");
1917 }
1918
1919 ATF_TC_BODY(dbregs_dr0_dont_inherit_execve, tc)
1920 {
1921 dbregs_dont_inherit_execve(0);
1922 }
1923
1924 ATF_TC(dbregs_dr1_dont_inherit_execve);
1925 ATF_TC_HEAD(dbregs_dr1_dont_inherit_execve, tc)
1926 {
1927 atf_tc_set_md_var(tc, "descr",
1928 "Verify that execve(2) is intercepted by tracer and Debug "
1929 "Register 1 is reset");
1930 }
1931
1932 ATF_TC_BODY(dbregs_dr1_dont_inherit_execve, tc)
1933 {
1934 dbregs_dont_inherit_execve(1);
1935 }
1936
1937 ATF_TC(dbregs_dr2_dont_inherit_execve);
1938 ATF_TC_HEAD(dbregs_dr2_dont_inherit_execve, tc)
1939 {
1940 atf_tc_set_md_var(tc, "descr",
1941 "Verify that execve(2) is intercepted by tracer and Debug "
1942 "Register 2 is reset");
1943 }
1944
1945 ATF_TC_BODY(dbregs_dr2_dont_inherit_execve, tc)
1946 {
1947 dbregs_dont_inherit_execve(2);
1948 }
1949
1950 ATF_TC(dbregs_dr3_dont_inherit_execve);
1951 ATF_TC_HEAD(dbregs_dr3_dont_inherit_execve, tc)
1952 {
1953 atf_tc_set_md_var(tc, "descr",
1954 "Verify that execve(2) is intercepted by tracer and Debug "
1955 "Register 3 is reset");
1956 }
1957
1958 ATF_TC_BODY(dbregs_dr3_dont_inherit_execve, tc)
1959 {
1960 dbregs_dont_inherit_execve(3);
1961 }
1962
1963 /// ----------------------------------------------------------------------------
1964
1965 ATF_TC(x86_cve_2018_8897);
1966 ATF_TC_HEAD(x86_cve_2018_8897, tc)
1967 {
1968 atf_tc_set_md_var(tc, "descr",
1969 "Verify mitigation for CVE-2018-8897 (POP SS debug exception)");
1970 }
1971
1972 #define X86_CVE_2018_8897_PAGE 0x5000 /* page addressable by 32-bit registers */
1973
1974 static void
1975 x86_cve_2018_8897_trigger(void)
1976 {
1977 /*
1978 * A function to trigger the POP SS (CVE-2018-8897) vulnerability
1979 *
1980 * ifdef __x86_64__
1981 *
1982 * We need to switch to 32-bit mode execution on 64-bit kernel.
1983 * This is achieved with far jump instruction and GDT descriptor
1984 * set to 32-bit CS selector. The 32-bit CS selector is kernel
1985 * specific, in the NetBSD case registered as GUCODE32_SEL
1986 * that is equal to (14 (decimal) << 3) with GDT and user
1987 * privilege level (this makes it 0x73).
1988 *
1989 * In UNIX as(1) assembly x86_64 far jump is coded as ljmp.
1990 * amd64 ljmp requires an indirect address with cs:RIP.
1991 *
1992 * When we are running in 32-bit mode, it's similar to the
1993 * mode as if the binary had been launched in netbsd32.
1994 *
1995 * There are two versions of this exploit, one with RIP
1996 * relative code and the other with static addresses.
1997 * The first one is PIE code aware, the other no-PIE one.
1998 *
1999 *
2000 * After switching to the 32-bit mode we can move on to the remaining
2001 * part of the exploit.
2002 *
2003 * endif // __x86_64__
2004 *
2005 * Set the stack pointer to the page we allocated earlier. Remember
2006 * that we put an SS selector exactly at this address, so we can pop.
2007 *
2008 * movl $0x5000,%esp
2009 *
2010 * Pop the SS selector off the stack. This reloads the SS selector,
2011 * which is fine. Remember that we set DR0 at address 0x5000, which
2012 * we are now reading. Therefore, on this instruction, the CPU will
2013 * raise a #DB exception.
2014 *
2015 * But the "pop %ss" instruction is special: it blocks exceptions
2016 * until the next instruction is executed. So the #DB that we just
2017 * raised is actually blocked.
2018 *
2019 * pop %ss
2020 *
2021 * We are still here, and didn't receive the #DB. After we execute
2022 * this instruction, the effect of "pop %ss" will disappear, and
2023 * we will receive the #DB for real.
2024 *
2025 * int $4
2026 *
2027 * Here the bug happens. We executed "int $4", so we entered the
2028 * kernel, with interrupts disabled. The #DB that was pending is
2029 * received. But, it is received immediately in kernel mode, and is
2030 * _NOT_ received when interrupts are enabled again.
2031 *
2032 * It means that, in the first instruction of the $4 handler, we
2033 * think we are safe with interrupts disabled. But we aren't, and
2034 * just got interrupted.
2035 *
2036 * The new interrupt handler doesn't handle this particular context:
2037 * we are entered in kernel mode, the previous context was kernel
2038 * mode too but it still had the user context loaded.
2039 *
2040 * We find ourselves not doing a 'swapgs'. At the end of the day, it
2041 * means that we call trap() with a curcpu() that is fully
2042 * controllable by userland. From then on, it is easy to escalate
2043 * privileges.
2044 *
2045 * With SVS it also means we don't switch CR3, so this results in a
2046 * triple fault, which this time cannot be turned to a privilege
2047 * escalation.
2048 */
2049
2050 #if __x86_64__
2051 #if __PIE__
2052 void *csRIP;
2053
2054 csRIP = malloc(sizeof(int) + sizeof(short));
2055 FORKEE_ASSERT(csRIP != NULL);
2056
2057 __asm__ __volatile__(
2058 " leal 24(%%eip), %%eax\n\t"
2059 " movq %0, %%rdx\n\t"
2060 " movl %%eax, (%%rdx)\n\t"
2061 " movw $0x73, 4(%%rdx)\n\t"
2062 " movq %1, %%rax\n\t"
2063 " ljmp *(%%rax)\n\t"
2064 " .code32\n\t"
2065 " movl $0x5000, %%esp\n\t"
2066 " pop %%ss\n\t"
2067 " int $4\n\t"
2068 " .code64\n\t"
2069 : "=m"(csRIP)
2070 : "m"(csRIP)
2071 : "%rax", "%rdx", "%rsp"
2072 );
2073 #else /* !__PIE__ */
2074 __asm__ __volatile__(
2075 " movq $farjmp32, %%rax\n\t"
2076 " ljmp *(%%rax)\n\t"
2077 "farjmp32:\n\t"
2078 " .long trigger32\n\t"
2079 " .word 0x73\n\t"
2080 " .code32\n\t"
2081 "trigger32:\n\t"
2082 " movl $0x5000, %%esp\n\t"
2083 " pop %%ss\n\t"
2084 " int $4\n\t"
2085 " .code64\n\t"
2086 :
2087 :
2088 : "%rax", "%rsp"
2089 );
2090 #endif
2091 #elif __i386__
2092 __asm__ __volatile__(
2093 "movl $0x5000, %%esp\n\t"
2094 "pop %%ss\n\t"
2095 "int $4\n\t"
2096 :
2097 :
2098 : "%esp"
2099 );
2100 #endif
2101 }
2102
2103 ATF_TC_BODY(x86_cve_2018_8897, tc)
2104 {
2105 const int sigval = SIGSTOP;
2106 pid_t child, wpid;
2107 #if defined(TWAIT_HAVE_STATUS)
2108 int status;
2109 #endif
2110 char *trap_page;
2111 struct dbreg db;
2112
2113
2114 if (!can_we_set_dbregs()) {
2115 atf_tc_skip("Either run this test as root or set sysctl(3) "
2116 "security.models.extensions.user_set_dbregs to 1");
2117 }
2118
2119 DPRINTF("Before forking process PID=%d\n", getpid());
2120 SYSCALL_REQUIRE((child = fork()) != -1);
2121 if (child == 0) {
2122 DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
2123 FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
2124
2125 trap_page = mmap((void *)X86_CVE_2018_8897_PAGE,
2126 sysconf(_SC_PAGESIZE), PROT_READ|PROT_WRITE,
2127 MAP_FIXED|MAP_ANON|MAP_PRIVATE, -1, 0);
2128
2129 /* trigger page fault */
2130 memset(trap_page, 0, sysconf(_SC_PAGESIZE));
2131
2132 // kernel GDT
2133 #if __x86_64__
2134 /* SS selector (descriptor 9 (0x4f >> 3)) */
2135 *trap_page = 0x4f;
2136 #elif __i386__
2137 /* SS selector (descriptor 4 (0x23 >> 3)) */
2138 *trap_page = 0x23;
2139 #endif
2140
2141 DPRINTF("Before raising %s from child\n", strsignal(sigval));
2142 FORKEE_ASSERT(raise(sigval) == 0);
2143
2144 x86_cve_2018_8897_trigger();
2145
2146 /* NOTREACHED */
2147 FORKEE_ASSERTX(0 && "This shall not be reached");
2148 }
2149 DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
2150
2151 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2152 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2153
2154 validate_status_stopped(status, sigval);
2155
2156 DPRINTF("Call GETDBREGS for the child process\n");
2157 SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &db, 0) != -1);
2158
2159 /*
2160 * Set up the dbregs. We put the 0x5000 address in DR0.
2161 * It means that, the first time we touch this, the CPU will trigger a
2162 * #DB exception.
2163 */
2164 db.dr[0] = X86_CVE_2018_8897_PAGE;
2165 db.dr[7] = 0x30003;
2166
2167 DPRINTF("Call SETDBREGS for the child process\n");
2168 SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &db, 0) != -1);
2169
2170 DPRINTF("Before resuming the child process where it left off and "
2171 "without signal to be sent\n");
2172 SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
2173
2174 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2175 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2176
2177 // In this test we receive SIGFPE, is this appropriate?
2178 // validate_status_stopped(status, SIGFPE);
2179
2180 DPRINTF("Kill the child process\n");
2181 SYSCALL_REQUIRE(ptrace(PT_KILL, child, NULL, 0) != -1);
2182
2183 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2184 TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2185
2186 validate_status_signaled(status, SIGKILL, 0);
2187
2188 DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2189 TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
2190 }
2191
2192 /// ----------------------------------------------------------------------------
2193
2194 #define ATF_TP_ADD_TCS_PTRACE_WAIT_X86() \
2195 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_print); \
2196 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr0); \
2197 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr1); \
2198 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr2); \
2199 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr3); \
2200 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr0_yield); \
2201 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr1_yield); \
2202 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr2_yield); \
2203 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr3_yield); \
2204 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr0_continued); \
2205 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr1_continued); \
2206 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr2_continued); \
2207 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr3_continued); \
2208 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_writeonly_byte); \
2209 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_writeonly_byte); \
2210 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_writeonly_byte); \
2211 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_writeonly_byte); \
2212 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_writeonly_2bytes); \
2213 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_writeonly_2bytes); \
2214 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_writeonly_2bytes); \
2215 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_writeonly_2bytes); \
2216 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_writeonly_4bytes); \
2217 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_writeonly_4bytes); \
2218 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_writeonly_4bytes); \
2219 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_writeonly_4bytes); \
2220 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_write_byte); \
2221 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_write_byte); \
2222 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_write_byte); \
2223 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_write_byte); \
2224 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_write_2bytes); \
2225 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_write_2bytes); \
2226 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_write_2bytes); \
2227 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_write_2bytes); \
2228 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_write_4bytes); \
2229 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_write_4bytes); \
2230 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_write_4bytes); \
2231 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_write_4bytes); \
2232 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_read_byte); \
2233 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_read_byte); \
2234 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_read_byte); \
2235 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_read_byte); \
2236 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_read_2bytes); \
2237 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_read_2bytes); \
2238 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_read_2bytes); \
2239 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_read_2bytes); \
2240 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_read_4bytes); \
2241 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_read_4bytes); \
2242 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_read_4bytes); \
2243 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_read_4bytes); \
2244 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_code); \
2245 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_code); \
2246 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_code); \
2247 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_code); \
2248 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_dont_inherit_lwp); \
2249 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_dont_inherit_lwp); \
2250 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_dont_inherit_lwp); \
2251 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_dont_inherit_lwp); \
2252 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_dont_inherit_execve); \
2253 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_dont_inherit_execve); \
2254 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_dont_inherit_execve); \
2255 ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_dont_inherit_execve); \
2256 ATF_TP_ADD_TC_HAVE_DBREGS(tp, x86_cve_2018_8897);
2257 #else
2258 #define ATF_TP_ADD_TCS_PTRACE_WAIT_X86()
2259 #endif
2260