xref: /netbsd-src/tests/lib/libc/sys/t_ptrace_x86_wait.h (revision 873249d16276ca1939fdd84b86cf93fe6be06ffb)
1 /*	$NetBSD: t_ptrace_x86_wait.h,v 1.10 2019/05/09 13:07:35 mgorny Exp $	*/
2 
3 /*-
4  * Copyright (c) 2016, 2017, 2018, 2019 The NetBSD Foundation, Inc.
5  * All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  *
16  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
17  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
18  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
20  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
21  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
22  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
23  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
24  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
25  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
26  * POSSIBILITY OF SUCH DAMAGE.
27  */
28 
29 #if defined(__i386__) || defined(__x86_64__)
30 union u {
31 	unsigned long raw;
32 	struct {
33 		unsigned long local_dr0_breakpoint : 1;		/* 0 */
34 		unsigned long global_dr0_breakpoint : 1;	/* 1 */
35 		unsigned long local_dr1_breakpoint : 1;		/* 2 */
36 		unsigned long global_dr1_breakpoint : 1;	/* 3 */
37 		unsigned long local_dr2_breakpoint : 1;		/* 4 */
38 		unsigned long global_dr2_breakpoint : 1;	/* 5 */
39 		unsigned long local_dr3_breakpoint : 1;		/* 6 */
40 		unsigned long global_dr3_breakpoint : 1;	/* 7 */
41 		unsigned long local_exact_breakpt : 1;		/* 8 */
42 		unsigned long global_exact_breakpt : 1;		/* 9 */
43 		unsigned long reserved_10 : 1;			/* 10 */
44 		unsigned long rest_trans_memory : 1;		/* 11 */
45 		unsigned long reserved_12 : 1;			/* 12 */
46 		unsigned long general_detect_enable : 1;	/* 13 */
47 		unsigned long reserved_14 : 1;			/* 14 */
48 		unsigned long reserved_15 : 1;			/* 15 */
49 		unsigned long condition_dr0 : 2;		/* 16-17 */
50 		unsigned long len_dr0 : 2;			/* 18-19 */
51 		unsigned long condition_dr1 : 2;		/* 20-21 */
52 		unsigned long len_dr1 : 2;			/* 22-23 */
53 		unsigned long condition_dr2 : 2;		/* 24-25 */
54 		unsigned long len_dr2 : 2;			/* 26-27 */
55 		unsigned long condition_dr3 : 2;		/* 28-29 */
56 		unsigned long len_dr3 : 2;			/* 30-31 */
57 	} bits;
58 };
59 
60 ATF_TC(dbregs_print);
61 ATF_TC_HEAD(dbregs_print, tc)
62 {
63 	atf_tc_set_md_var(tc, "descr",
64 	    "Verify plain PT_GETDBREGS with printing Debug Registers");
65 }
66 
67 ATF_TC_BODY(dbregs_print, tc)
68 {
69 	const int exitval = 5;
70 	const int sigval = SIGSTOP;
71 	pid_t child, wpid;
72 #if defined(TWAIT_HAVE_STATUS)
73 	int status;
74 #endif
75 	struct dbreg r;
76 	size_t i;
77 
78 	DPRINTF("Before forking process PID=%d\n", getpid());
79 	SYSCALL_REQUIRE((child = fork()) != -1);
80 	if (child == 0) {
81 		DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
82 		FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
83 
84 		DPRINTF("Before raising %s from child\n", strsignal(sigval));
85 		FORKEE_ASSERT(raise(sigval) == 0);
86 
87 		DPRINTF("Before exiting of the child process\n");
88 		_exit(exitval);
89 	}
90 	DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
91 
92 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
93 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
94 
95 	validate_status_stopped(status, sigval);
96 
97 	DPRINTF("Call GETDBREGS for the child process\n");
98 	SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r, 0) != -1);
99 
100 	DPRINTF("State of the debug registers:\n");
101 	for (i = 0; i < __arraycount(r.dr); i++)
102 		DPRINTF("r[%zu]=%" PRIxREGISTER "\n", i, r.dr[i]);
103 
104 	DPRINTF("Before resuming the child process where it left off and "
105 	    "without signal to be sent\n");
106 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
107 
108 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
109 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
110 
111 	validate_status_exited(status, exitval);
112 
113 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
114 	TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
115 }
116 
117 
118 enum dbreg_preserve_mode {
119 	dbreg_preserve_mode_none,
120 	dbreg_preserve_mode_yield,
121 	dbreg_preserve_mode_continued
122 };
123 
124 static void
125 dbreg_preserve(int reg, enum dbreg_preserve_mode mode)
126 {
127 	const int exitval = 5;
128 	const int sigval = SIGSTOP;
129 	pid_t child, wpid;
130 #if defined(TWAIT_HAVE_STATUS)
131 	int status;
132 #endif
133 	struct dbreg r1;
134 	struct dbreg r2;
135 	size_t i;
136 	int watchme;
137 
138 	if (!can_we_set_dbregs()) {
139 		atf_tc_skip("Either run this test as root or set sysctl(3) "
140 		            "security.models.extensions.user_set_dbregs to 1");
141 	}
142 
143 	DPRINTF("Before forking process PID=%d\n", getpid());
144 	SYSCALL_REQUIRE((child = fork()) != -1);
145 	if (child == 0) {
146 		DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
147 		FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
148 
149 		DPRINTF("Before raising %s from child\n", strsignal(sigval));
150 		FORKEE_ASSERT(raise(sigval) == 0);
151 
152 		if (mode == dbreg_preserve_mode_continued) {
153 			DPRINTF("Before raising %s from child\n",
154 			       strsignal(sigval));
155 			FORKEE_ASSERT(raise(sigval) == 0);
156 		}
157 
158 		DPRINTF("Before exiting of the child process\n");
159 		_exit(exitval);
160 	}
161 	DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
162 
163 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
164 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
165 
166 	validate_status_stopped(status, sigval);
167 
168 	DPRINTF("Call GETDBREGS for the child process (r1)\n");
169 	SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
170 
171 	DPRINTF("State of the debug registers (r1):\n");
172 	for (i = 0; i < __arraycount(r1.dr); i++)
173 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
174 
175 	r1.dr[reg] = (long)(intptr_t)&watchme;
176 	DPRINTF("Set DR0 (r1.dr[%d]) to new value %" PRIxREGISTER "\n",
177 	    reg, r1.dr[reg]);
178 
179 	DPRINTF("New state of the debug registers (r1):\n");
180 	for (i = 0; i < __arraycount(r1.dr); i++)
181 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
182 
183 	DPRINTF("Call SETDBREGS for the child process (r1)\n");
184 	SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
185 
186 	switch (mode) {
187 	case dbreg_preserve_mode_none:
188 		break;
189 	case dbreg_preserve_mode_yield:
190 		DPRINTF("Yields a processor voluntarily and gives other "
191 		       "threads a chance to run without waiting for an "
192 		       "involuntary preemptive switch\n");
193 		sched_yield();
194 		break;
195 	case dbreg_preserve_mode_continued:
196 		DPRINTF("Call CONTINUE for the child process\n");
197 	        SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
198 
199 		DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
200 		TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
201 
202 		validate_status_stopped(status, sigval);
203 		break;
204 	}
205 
206 	DPRINTF("Call GETDBREGS for the child process (r2)\n");
207 	SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r2, 0) != -1);
208 
209 	DPRINTF("Assert that (r1) and (r2) are the same\n");
210 	SYSCALL_REQUIRE(memcmp(&r1, &r2, sizeof(r1)) == 0);
211 
212 	DPRINTF("Before resuming the child process where it left off and "
213 	    "without signal to be sent\n");
214 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
215 
216 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
217 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
218 
219 	validate_status_exited(status, exitval);
220 
221 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
222 	TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
223 }
224 
225 
226 ATF_TC(dbregs_preserve_dr0);
227 ATF_TC_HEAD(dbregs_preserve_dr0, tc)
228 {
229 	atf_tc_set_md_var(tc, "descr",
230 	    "Verify that setting DR0 is preserved across ptrace(2) calls");
231 }
232 
233 ATF_TC_BODY(dbregs_preserve_dr0, tc)
234 {
235 	dbreg_preserve(0, dbreg_preserve_mode_none);
236 }
237 
238 ATF_TC(dbregs_preserve_dr1);
239 ATF_TC_HEAD(dbregs_preserve_dr1, tc)
240 {
241 	atf_tc_set_md_var(tc, "descr",
242 	    "Verify that setting DR1 is preserved across ptrace(2) calls");
243 }
244 
245 ATF_TC_BODY(dbregs_preserve_dr1, tc)
246 {
247 	dbreg_preserve(1, dbreg_preserve_mode_none);
248 }
249 
250 ATF_TC(dbregs_preserve_dr2);
251 ATF_TC_HEAD(dbregs_preserve_dr2, tc)
252 {
253 	atf_tc_set_md_var(tc, "descr",
254 	    "Verify that setting DR2 is preserved across ptrace(2) calls");
255 }
256 
257 ATF_TC_BODY(dbregs_preserve_dr2, tc)
258 {
259 	dbreg_preserve(2, dbreg_preserve_mode_none);
260 }
261 
262 ATF_TC(dbregs_preserve_dr3);
263 ATF_TC_HEAD(dbregs_preserve_dr3, tc)
264 {
265 	atf_tc_set_md_var(tc, "descr",
266 	    "Verify that setting DR3 is preserved across ptrace(2) calls");
267 }
268 
269 ATF_TC_BODY(dbregs_preserve_dr3, tc)
270 {
271 	dbreg_preserve(3, dbreg_preserve_mode_none);
272 }
273 
274 ATF_TC(dbregs_preserve_dr0_yield);
275 ATF_TC_HEAD(dbregs_preserve_dr0_yield, tc)
276 {
277 	atf_tc_set_md_var(tc, "descr",
278 	    "Verify that setting DR0 is preserved across ptrace(2) calls with "
279 	    "scheduler yield");
280 }
281 
282 ATF_TC_BODY(dbregs_preserve_dr0_yield, tc)
283 {
284 	dbreg_preserve(0, dbreg_preserve_mode_yield);
285 }
286 
287 ATF_TC(dbregs_preserve_dr1_yield);
288 ATF_TC_HEAD(dbregs_preserve_dr1_yield, tc)
289 {
290 	atf_tc_set_md_var(tc, "descr",
291 	    "Verify that setting DR1 is preserved across ptrace(2) calls with "
292 	    "scheduler yield");
293 }
294 
295 ATF_TC_BODY(dbregs_preserve_dr1_yield, tc)
296 {
297 	dbreg_preserve(0, dbreg_preserve_mode_yield);
298 }
299 
300 ATF_TC(dbregs_preserve_dr2_yield);
301 ATF_TC_HEAD(dbregs_preserve_dr2_yield, tc)
302 {
303 	atf_tc_set_md_var(tc, "descr",
304 	    "Verify that setting DR2 is preserved across ptrace(2) calls with "
305 	    "scheduler yield");
306 }
307 
308 ATF_TC_BODY(dbregs_preserve_dr2_yield, tc)
309 {
310 	dbreg_preserve(0, dbreg_preserve_mode_yield);
311 }
312 
313 
314 ATF_TC(dbregs_preserve_dr3_yield);
315 ATF_TC_HEAD(dbregs_preserve_dr3_yield, tc)
316 {
317 	atf_tc_set_md_var(tc, "descr",
318 	    "Verify that setting DR3 is preserved across ptrace(2) calls with "
319 	    "scheduler yield");
320 }
321 
322 ATF_TC_BODY(dbregs_preserve_dr3_yield, tc)
323 {
324 	dbreg_preserve(3, dbreg_preserve_mode_yield);
325 }
326 
327 ATF_TC(dbregs_preserve_dr0_continued);
328 ATF_TC_HEAD(dbregs_preserve_dr0_continued, tc)
329 {
330 	atf_tc_set_md_var(tc, "descr",
331 	    "Verify that setting DR0 is preserved across ptrace(2) calls and "
332 	    "with continued child");
333 }
334 
335 ATF_TC_BODY(dbregs_preserve_dr0_continued, tc)
336 {
337 	dbreg_preserve(0, dbreg_preserve_mode_continued);
338 }
339 
340 ATF_TC(dbregs_preserve_dr1_continued);
341 ATF_TC_HEAD(dbregs_preserve_dr1_continued, tc)
342 {
343 	atf_tc_set_md_var(tc, "descr",
344 	    "Verify that setting DR1 is preserved across ptrace(2) calls and "
345 	    "with continued child");
346 }
347 
348 ATF_TC_BODY(dbregs_preserve_dr1_continued, tc)
349 {
350 	dbreg_preserve(1, dbreg_preserve_mode_continued);
351 }
352 
353 ATF_TC(dbregs_preserve_dr2_continued);
354 ATF_TC_HEAD(dbregs_preserve_dr2_continued, tc)
355 {
356 	atf_tc_set_md_var(tc, "descr",
357 	    "Verify that setting DR2 is preserved across ptrace(2) calls and "
358 	    "with continued child");
359 }
360 
361 ATF_TC_BODY(dbregs_preserve_dr2_continued, tc)
362 {
363 	dbreg_preserve(2, dbreg_preserve_mode_continued);
364 }
365 
366 ATF_TC(dbregs_preserve_dr3_continued);
367 ATF_TC_HEAD(dbregs_preserve_dr3_continued, tc)
368 {
369 	atf_tc_set_md_var(tc, "descr",
370 	    "Verify that setting DR3 is preserved across ptrace(2) calls and "
371 	    "with continued child");
372 }
373 
374 ATF_TC_BODY(dbregs_preserve_dr3_continued, tc)
375 {
376 	dbreg_preserve(3, dbreg_preserve_mode_continued);
377 }
378 
379 
380 static void
381 dbregs_trap_variable(int reg, int cond, int len, bool write)
382 {
383 	const int exitval = 5;
384 	const int sigval = SIGSTOP;
385 	pid_t child, wpid;
386 #if defined(TWAIT_HAVE_STATUS)
387 	int status;
388 #endif
389 	struct dbreg r1;
390 	size_t i;
391 	volatile int watchme = 0;
392 	union u dr7;
393 
394 	struct ptrace_siginfo info;
395 	memset(&info, 0, sizeof(info));
396 
397 	if (!can_we_set_dbregs()) {
398 		atf_tc_skip("Either run this test as root or set sysctl(3) "
399 		            "security.models.extensions.user_set_dbregs to 1");
400 	}
401 
402 	dr7.raw = 0;
403 	switch (reg) {
404 	case 0:
405 		dr7.bits.global_dr0_breakpoint = 1;
406 		dr7.bits.condition_dr0 = cond;
407 		dr7.bits.len_dr0 = len;
408 		break;
409 	case 1:
410 		dr7.bits.global_dr1_breakpoint = 1;
411 		dr7.bits.condition_dr1 = cond;
412 		dr7.bits.len_dr1 = len;
413 		break;
414 	case 2:
415 		dr7.bits.global_dr2_breakpoint = 1;
416 		dr7.bits.condition_dr2 = cond;
417 		dr7.bits.len_dr2 = len;
418 		break;
419 	case 3:
420 		dr7.bits.global_dr3_breakpoint = 1;
421 		dr7.bits.condition_dr3 = cond;
422 		dr7.bits.len_dr3 = len;
423 		break;
424 	}
425 
426 	DPRINTF("Before forking process PID=%d\n", getpid());
427 	SYSCALL_REQUIRE((child = fork()) != -1);
428 	if (child == 0) {
429 		DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
430 		FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
431 
432 		DPRINTF("Before raising %s from child\n", strsignal(sigval));
433 		FORKEE_ASSERT(raise(sigval) == 0);
434 
435 		if (write)
436 			watchme = 1;
437 		else
438 			printf("watchme=%d\n", watchme);
439 
440 		DPRINTF("Before raising %s from child\n", strsignal(sigval));
441 		FORKEE_ASSERT(raise(sigval) == 0);
442 
443 		DPRINTF("Before exiting of the child process\n");
444 		_exit(exitval);
445 	}
446 	DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
447 
448 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
449 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
450 
451 	validate_status_stopped(status, sigval);
452 
453 	DPRINTF("Call GETDBREGS for the child process (r1)\n");
454 	SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
455 
456 	DPRINTF("State of the debug registers (r1):\n");
457 	for (i = 0; i < __arraycount(r1.dr); i++)
458 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
459 
460 	r1.dr[reg] = (long)(intptr_t)&watchme;
461 	DPRINTF("Set DR%d (r1.dr[%d]) to new value %" PRIxREGISTER "\n",
462 	    reg, reg, r1.dr[reg]);
463 
464 	r1.dr[7] = dr7.raw;
465 	DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
466 	    r1.dr[7]);
467 
468 	DPRINTF("New state of the debug registers (r1):\n");
469 	for (i = 0; i < __arraycount(r1.dr); i++)
470 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
471 
472 	DPRINTF("Call SETDBREGS for the child process (r1)\n");
473 	SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
474 
475 	DPRINTF("Call CONTINUE for the child process\n");
476 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
477 
478 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
479 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
480 
481 	validate_status_stopped(status, SIGTRAP);
482 
483 	DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
484 	SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
485 
486 	DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
487 	DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
488 	    info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
489 	    info.psi_siginfo.si_errno);
490 
491 	DPRINTF("Before checking siginfo_t\n");
492 	ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, SIGTRAP);
493 	ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_DBREG);
494 
495 	DPRINTF("Call CONTINUE for the child process\n");
496 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
497 
498 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
499 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
500 
501 	validate_status_stopped(status, sigval);
502 
503 	DPRINTF("Before resuming the child process where it left off and "
504 	    "without signal to be sent\n");
505 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
506 
507 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
508 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
509 
510 	validate_status_exited(status, exitval);
511 
512 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
513 	TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
514 }
515 
516 ATF_TC(dbregs_dr0_trap_variable_writeonly_byte);
517 ATF_TC_HEAD(dbregs_dr0_trap_variable_writeonly_byte, tc)
518 {
519 	atf_tc_set_md_var(tc, "descr",
520 	    "Verify that setting trap with DR0 triggers SIGTRAP "
521 	    "(break on data writes only and 1 byte mode)");
522 }
523 
524 ATF_TC_BODY(dbregs_dr0_trap_variable_writeonly_byte, tc)
525 {
526 	/* 0b01 -- break on data write only */
527 	/* 0b00 -- 1 byte */
528 
529 	dbregs_trap_variable(0, 1, 0, true);
530 }
531 
532 ATF_TC(dbregs_dr1_trap_variable_writeonly_byte);
533 ATF_TC_HEAD(dbregs_dr1_trap_variable_writeonly_byte, tc)
534 {
535 	atf_tc_set_md_var(tc, "descr",
536 	    "Verify that setting trap with DR1 triggers SIGTRAP "
537 	    "(break on data writes only and 1 byte mode)");
538 }
539 
540 ATF_TC_BODY(dbregs_dr1_trap_variable_writeonly_byte, tc)
541 {
542 	/* 0b01 -- break on data write only */
543 	/* 0b00 -- 1 byte */
544 
545 	dbregs_trap_variable(1, 1, 0, true);
546 }
547 
548 ATF_TC(dbregs_dr2_trap_variable_writeonly_byte);
549 ATF_TC_HEAD(dbregs_dr2_trap_variable_writeonly_byte, tc)
550 {
551 	atf_tc_set_md_var(tc, "descr",
552 	    "Verify that setting trap with DR2 triggers SIGTRAP "
553 	    "(break on data writes only and 1 byte mode)");
554 }
555 
556 ATF_TC_BODY(dbregs_dr2_trap_variable_writeonly_byte, tc)
557 {
558 	/* 0b01 -- break on data write only */
559 	/* 0b00 -- 1 byte */
560 
561 	dbregs_trap_variable(2, 1, 0, true);
562 }
563 
564 ATF_TC(dbregs_dr3_trap_variable_writeonly_byte);
565 ATF_TC_HEAD(dbregs_dr3_trap_variable_writeonly_byte, tc)
566 {
567 	atf_tc_set_md_var(tc, "descr",
568 	    "Verify that setting trap with DR3 triggers SIGTRAP "
569 	    "(break on data writes only and 1 byte mode)");
570 }
571 
572 ATF_TC_BODY(dbregs_dr3_trap_variable_writeonly_byte, tc)
573 {
574 	/* 0b01 -- break on data write only */
575 	/* 0b00 -- 1 byte */
576 
577 	dbregs_trap_variable(3, 1, 0, true);
578 }
579 
580 ATF_TC(dbregs_dr0_trap_variable_writeonly_2bytes);
581 ATF_TC_HEAD(dbregs_dr0_trap_variable_writeonly_2bytes, tc)
582 {
583 	atf_tc_set_md_var(tc, "descr",
584 	    "Verify that setting trap with DR0 triggers SIGTRAP "
585 	    "(break on data writes only and 2 bytes mode)");
586 }
587 
588 ATF_TC_BODY(dbregs_dr0_trap_variable_writeonly_2bytes, tc)
589 {
590 	/* 0b01 -- break on data write only */
591 	/* 0b01 -- 2 bytes */
592 
593 	dbregs_trap_variable(0, 1, 1, true);
594 }
595 
596 ATF_TC(dbregs_dr1_trap_variable_writeonly_2bytes);
597 ATF_TC_HEAD(dbregs_dr1_trap_variable_writeonly_2bytes, tc)
598 {
599 	atf_tc_set_md_var(tc, "descr",
600 	    "Verify that setting trap with DR1 triggers SIGTRAP "
601 	    "(break on data writes only and 2 bytes mode)");
602 }
603 
604 ATF_TC_BODY(dbregs_dr1_trap_variable_writeonly_2bytes, tc)
605 {
606 	/* 0b01 -- break on data write only */
607 	/* 0b01 -- 2 bytes */
608 
609 	dbregs_trap_variable(1, 1, 1, true);
610 }
611 
612 ATF_TC(dbregs_dr2_trap_variable_writeonly_2bytes);
613 ATF_TC_HEAD(dbregs_dr2_trap_variable_writeonly_2bytes, tc)
614 {
615 	atf_tc_set_md_var(tc, "descr",
616 	    "Verify that setting trap with DR2 triggers SIGTRAP "
617 	    "(break on data writes only and 2 bytes mode)");
618 }
619 
620 ATF_TC_BODY(dbregs_dr2_trap_variable_writeonly_2bytes, tc)
621 {
622 	/* 0b01 -- break on data write only */
623 	/* 0b01 -- 2 bytes */
624 
625 	dbregs_trap_variable(2, 1, 1, true);
626 }
627 
628 ATF_TC(dbregs_dr3_trap_variable_writeonly_2bytes);
629 ATF_TC_HEAD(dbregs_dr3_trap_variable_writeonly_2bytes, tc)
630 {
631 	atf_tc_set_md_var(tc, "descr",
632 	    "Verify that setting trap with DR3 triggers SIGTRAP "
633 	    "(break on data writes only and 2 bytes mode)");
634 }
635 
636 ATF_TC_BODY(dbregs_dr3_trap_variable_writeonly_2bytes, tc)
637 {
638 	/* 0b01 -- break on data write only */
639 	/* 0b01 -- 2 bytes */
640 
641 	dbregs_trap_variable(3, 1, 1, true);
642 }
643 
644 ATF_TC(dbregs_dr0_trap_variable_writeonly_4bytes);
645 ATF_TC_HEAD(dbregs_dr0_trap_variable_writeonly_4bytes, tc)
646 {
647 	atf_tc_set_md_var(tc, "descr",
648 	    "Verify that setting trap with DR0 triggers SIGTRAP "
649 	    "(break on data writes only and 4 bytes mode)");
650 }
651 
652 ATF_TC_BODY(dbregs_dr0_trap_variable_writeonly_4bytes, tc)
653 {
654 	/* 0b01 -- break on data write only */
655 	/* 0b11 -- 4 bytes */
656 
657 	dbregs_trap_variable(0, 1, 3, true);
658 }
659 
660 ATF_TC(dbregs_dr1_trap_variable_writeonly_4bytes);
661 ATF_TC_HEAD(dbregs_dr1_trap_variable_writeonly_4bytes, tc)
662 {
663 	atf_tc_set_md_var(tc, "descr",
664 	    "Verify that setting trap with DR1 triggers SIGTRAP "
665 	    "(break on data writes only and 4 bytes mode)");
666 }
667 
668 ATF_TC_BODY(dbregs_dr1_trap_variable_writeonly_4bytes, tc)
669 {
670 	/* 0b01 -- break on data write only */
671 	/* 0b11 -- 4 bytes */
672 
673 	dbregs_trap_variable(1, 1, 3, true);
674 }
675 
676 ATF_TC(dbregs_dr2_trap_variable_writeonly_4bytes);
677 ATF_TC_HEAD(dbregs_dr2_trap_variable_writeonly_4bytes, tc)
678 {
679 	atf_tc_set_md_var(tc, "descr",
680 	    "Verify that setting trap with DR2 triggers SIGTRAP "
681 	    "(break on data writes only and 4 bytes mode)");
682 }
683 
684 ATF_TC_BODY(dbregs_dr2_trap_variable_writeonly_4bytes, tc)
685 {
686 	/* 0b01 -- break on data write only */
687 	/* 0b11 -- 4 bytes */
688 
689 	dbregs_trap_variable(2, 1, 3, true);
690 }
691 
692 ATF_TC(dbregs_dr3_trap_variable_writeonly_4bytes);
693 ATF_TC_HEAD(dbregs_dr3_trap_variable_writeonly_4bytes, tc)
694 {
695 	atf_tc_set_md_var(tc, "descr",
696 	    "Verify that setting trap with DR3 triggers SIGTRAP "
697 	    "(break on data writes only and 4 bytes mode)");
698 }
699 
700 ATF_TC_BODY(dbregs_dr3_trap_variable_writeonly_4bytes, tc)
701 {
702 	/* 0b01 -- break on data write only */
703 	/* 0b11 -- 4 bytes */
704 
705 	dbregs_trap_variable(3, 1, 3, true);
706 }
707 
708 ATF_TC(dbregs_dr0_trap_variable_readwrite_write_byte);
709 ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_write_byte, tc)
710 {
711 	atf_tc_set_md_var(tc, "descr",
712 	    "Verify that setting trap with DR0 triggers SIGTRAP "
713 	    "(break on data read/write trap in read 1 byte mode)");
714 }
715 
716 ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_write_byte, tc)
717 {
718 	/* 0b11 -- break on data write&read */
719 	/* 0b00 -- 1 byte */
720 
721 	dbregs_trap_variable(0, 3, 0, true);
722 }
723 
724 ATF_TC(dbregs_dr1_trap_variable_readwrite_write_byte);
725 ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_write_byte, tc)
726 {
727 	atf_tc_set_md_var(tc, "descr",
728 	    "Verify that setting trap with DR1 triggers SIGTRAP "
729 	    "(break on data read/write trap in read 1 byte mode)");
730 }
731 
732 ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_write_byte, tc)
733 {
734 	/* 0b11 -- break on data write&read */
735 	/* 0b00 -- 1 byte */
736 
737 	dbregs_trap_variable(1, 3, 0, true);
738 }
739 
740 ATF_TC(dbregs_dr2_trap_variable_readwrite_write_byte);
741 ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_write_byte, tc)
742 {
743 	atf_tc_set_md_var(tc, "descr",
744 	    "Verify that setting trap with DR2 triggers SIGTRAP "
745 	    "(break on data read/write trap in read 1 byte mode)");
746 }
747 
748 ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_write_byte, tc)
749 {
750 	/* 0b11 -- break on data write&read */
751 	/* 0b00 -- 1 byte */
752 
753 	dbregs_trap_variable(2, 3, 0, true);
754 }
755 
756 ATF_TC(dbregs_dr3_trap_variable_readwrite_write_byte);
757 ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_write_byte, tc)
758 {
759 	atf_tc_set_md_var(tc, "descr",
760 	    "Verify that setting trap with DR3 triggers SIGTRAP "
761 	    "(break on data read/write trap in read 1 byte mode)");
762 }
763 
764 ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_write_byte, tc)
765 {
766 	/* 0b11 -- break on data write&read */
767 	/* 0b00 -- 1 byte */
768 
769 	dbregs_trap_variable(3, 3, 0, true);
770 }
771 
772 ATF_TC(dbregs_dr0_trap_variable_readwrite_write_2bytes);
773 ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_write_2bytes, tc)
774 {
775 	atf_tc_set_md_var(tc, "descr",
776 	    "Verify that setting trap with DR0 triggers SIGTRAP "
777 	    "(break on data read/write trap in read 2 bytes mode)");
778 }
779 
780 ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_write_2bytes, tc)
781 {
782 	/* 0b11 -- break on data write&read */
783 	/* 0b01 -- 2 bytes */
784 
785 	dbregs_trap_variable(0, 3, 1, true);
786 }
787 
788 ATF_TC(dbregs_dr1_trap_variable_readwrite_write_2bytes);
789 ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_write_2bytes, tc)
790 {
791 	atf_tc_set_md_var(tc, "descr",
792 	    "Verify that setting trap with DR1 triggers SIGTRAP "
793 	    "(break on data read/write trap in read 2 bytes mode)");
794 }
795 
796 ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_write_2bytes, tc)
797 {
798 	/* 0b11 -- break on data write&read */
799 	/* 0b01 -- 2 bytes */
800 
801 	dbregs_trap_variable(1, 3, 1, true);
802 }
803 
804 ATF_TC(dbregs_dr2_trap_variable_readwrite_write_2bytes);
805 ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_write_2bytes, tc)
806 {
807 	atf_tc_set_md_var(tc, "descr",
808 	    "Verify that setting trap with DR2 triggers SIGTRAP "
809 	    "(break on data read/write trap in read 2 bytes mode)");
810 }
811 
812 ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_write_2bytes, tc)
813 {
814 	/* 0b11 -- break on data write&read */
815 	/* 0b01 -- 2 bytes */
816 
817 	dbregs_trap_variable(2, 3, 1, true);
818 }
819 
820 ATF_TC(dbregs_dr3_trap_variable_readwrite_write_2bytes);
821 ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_write_2bytes, tc)
822 {
823 	atf_tc_set_md_var(tc, "descr",
824 	    "Verify that setting trap with DR3 triggers SIGTRAP "
825 	    "(break on data read/write trap in read 2 bytes mode)");
826 }
827 
828 ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_write_2bytes, tc)
829 {
830 	/* 0b11 -- break on data write&read */
831 	/* 0b01 -- 2 bytes */
832 
833 	dbregs_trap_variable(3, 3, 1, true);
834 }
835 
836 ATF_TC(dbregs_dr0_trap_variable_readwrite_write_4bytes);
837 ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_write_4bytes, tc)
838 {
839 	atf_tc_set_md_var(tc, "descr",
840 	    "Verify that setting trap with DR0 triggers SIGTRAP "
841 	    "(break on data read/write trap in read 4 bytes mode)");
842 }
843 
844 ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_write_4bytes, tc)
845 {
846 	/* 0b11 -- break on data write&read */
847 	/* 0b11 -- 4 bytes */
848 
849 	dbregs_trap_variable(0, 3, 3, true);
850 }
851 
852 ATF_TC(dbregs_dr1_trap_variable_readwrite_write_4bytes);
853 ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_write_4bytes, tc)
854 {
855 	atf_tc_set_md_var(tc, "descr",
856 	    "Verify that setting trap with DR1 triggers SIGTRAP "
857 	    "(break on data read/write trap in read 4 bytes mode)");
858 }
859 
860 ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_write_4bytes, tc)
861 {
862 	/* 0b11 -- break on data write&read */
863 	/* 0b11 -- 4 bytes */
864 
865 	dbregs_trap_variable(1, 3, 3, true);
866 }
867 
868 ATF_TC(dbregs_dr2_trap_variable_readwrite_write_4bytes);
869 ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_write_4bytes, tc)
870 {
871 	atf_tc_set_md_var(tc, "descr",
872 	    "Verify that setting trap with DR2 triggers SIGTRAP "
873 	    "(break on data read/write trap in read 4 bytes mode)");
874 }
875 
876 ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_write_4bytes, tc)
877 {
878 	/* 0b11 -- break on data write&read */
879 	/* 0b11 -- 4 bytes */
880 
881 	dbregs_trap_variable(2, 3, 3, true);
882 }
883 
884 ATF_TC(dbregs_dr3_trap_variable_readwrite_write_4bytes);
885 ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_write_4bytes, tc)
886 {
887 	atf_tc_set_md_var(tc, "descr",
888 	    "Verify that setting trap with DR3 triggers SIGTRAP "
889 	    "(break on data read/write trap in read 4 bytes mode)");
890 }
891 
892 ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_write_4bytes, tc)
893 {
894 	/* 0b11 -- break on data write&read */
895 	/* 0b11 -- 4 bytes */
896 
897 	dbregs_trap_variable(3, 3, 3, true);
898 }
899 
900 ATF_TC(dbregs_dr0_trap_variable_readwrite_read_byte);
901 ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_read_byte, tc)
902 {
903 	atf_tc_set_md_var(tc, "descr",
904 	    "Verify that setting trap with DR0 triggers SIGTRAP "
905 	    "(break on data read/write trap in write 1 byte mode)");
906 }
907 
908 ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_read_byte, tc)
909 {
910 	/* 0b11 -- break on data write&read */
911 	/* 0b00 -- 1 byte */
912 
913 	dbregs_trap_variable(0, 3, 0, false);
914 }
915 
916 ATF_TC(dbregs_dr1_trap_variable_readwrite_read_byte);
917 ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_read_byte, tc)
918 {
919 	atf_tc_set_md_var(tc, "descr",
920 	    "Verify that setting trap with DR1 triggers SIGTRAP "
921 	    "(break on data read/write trap in write 1 byte mode)");
922 }
923 
924 ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_read_byte, tc)
925 {
926 	/* 0b11 -- break on data write&read */
927 	/* 0b00 -- 1 byte */
928 
929 	dbregs_trap_variable(1, 3, 0, false);
930 }
931 
932 ATF_TC(dbregs_dr2_trap_variable_readwrite_read_byte);
933 ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_read_byte, tc)
934 {
935 	atf_tc_set_md_var(tc, "descr",
936 	    "Verify that setting trap with DR2 triggers SIGTRAP "
937 	    "(break on data read/write trap in write 1 byte mode)");
938 }
939 
940 ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_read_byte, tc)
941 {
942 	/* 0b11 -- break on data write&read */
943 	/* 0b00 -- 1 byte */
944 
945 	dbregs_trap_variable(2, 3, 0, false);
946 }
947 
948 ATF_TC(dbregs_dr3_trap_variable_readwrite_read_byte);
949 ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_read_byte, tc)
950 {
951 	atf_tc_set_md_var(tc, "descr",
952 	    "Verify that setting trap with DR3 triggers SIGTRAP "
953 	    "(break on data read/write trap in write 1 byte mode)");
954 }
955 
956 ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_read_byte, tc)
957 {
958 	/* 0b11 -- break on data write&read */
959 	/* 0b00 -- 1 byte */
960 
961 	dbregs_trap_variable(3, 3, 0, false);
962 }
963 
964 ATF_TC(dbregs_dr0_trap_variable_readwrite_read_2bytes);
965 ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_read_2bytes, tc)
966 {
967 	atf_tc_set_md_var(tc, "descr",
968 	    "Verify that setting trap with DR0 triggers SIGTRAP "
969 	    "(break on data read/write trap in write 2 bytes mode)");
970 }
971 
972 ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_read_2bytes, tc)
973 {
974 	/* 0b11 -- break on data write&read */
975 	/* 0b01 -- 2 bytes */
976 
977 	dbregs_trap_variable(0, 3, 1, false);
978 }
979 
980 ATF_TC(dbregs_dr1_trap_variable_readwrite_read_2bytes);
981 ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_read_2bytes, tc)
982 {
983 	atf_tc_set_md_var(tc, "descr",
984 	    "Verify that setting trap with DR1 triggers SIGTRAP "
985 	    "(break on data read/write trap in write 2 bytes mode)");
986 }
987 
988 ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_read_2bytes, tc)
989 {
990 	/* 0b11 -- break on data write&read */
991 	/* 0b01 -- 2 bytes */
992 
993 	dbregs_trap_variable(1, 3, 1, false);
994 }
995 
996 ATF_TC(dbregs_dr2_trap_variable_readwrite_read_2bytes);
997 ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_read_2bytes, tc)
998 {
999 	atf_tc_set_md_var(tc, "descr",
1000 	    "Verify that setting trap with DR2 triggers SIGTRAP "
1001 	    "(break on data read/write trap in write 2 bytes mode)");
1002 }
1003 
1004 ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_read_2bytes, tc)
1005 {
1006 	/* 0b11 -- break on data write&read */
1007 	/* 0b01 -- 2 bytes */
1008 
1009 	dbregs_trap_variable(2, 3, 1, false);
1010 }
1011 
1012 ATF_TC(dbregs_dr3_trap_variable_readwrite_read_2bytes);
1013 ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_read_2bytes, tc)
1014 {
1015 	atf_tc_set_md_var(tc, "descr",
1016 	    "Verify that setting trap with DR3 triggers SIGTRAP "
1017 	    "(break on data read/write trap in write 2 bytes mode)");
1018 }
1019 
1020 ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_read_2bytes, tc)
1021 {
1022 	/* 0b11 -- break on data write&read */
1023 	/* 0b01 -- 2 bytes */
1024 
1025 	dbregs_trap_variable(3, 3, 1, false);
1026 }
1027 
1028 ATF_TC(dbregs_dr0_trap_variable_readwrite_read_4bytes);
1029 ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_read_4bytes, tc)
1030 {
1031 	atf_tc_set_md_var(tc, "descr",
1032 	    "Verify that setting trap with DR0 triggers SIGTRAP "
1033 	    "(break on data read/write trap in write 4 bytes mode)");
1034 }
1035 
1036 ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_read_4bytes, tc)
1037 {
1038 	/* 0b11 -- break on data write&read */
1039 	/* 0b11 -- 4 bytes */
1040 
1041 	dbregs_trap_variable(0, 3, 3, false);
1042 }
1043 
1044 ATF_TC(dbregs_dr1_trap_variable_readwrite_read_4bytes);
1045 ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_read_4bytes, tc)
1046 {
1047 	atf_tc_set_md_var(tc, "descr",
1048 	    "Verify that setting trap with DR1 triggers SIGTRAP "
1049 	    "(break on data read/write trap in write 4 bytes mode)");
1050 }
1051 
1052 ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_read_4bytes, tc)
1053 {
1054 	/* 0b11 -- break on data write&read */
1055 	/* 0b11 -- 4 bytes */
1056 
1057 	dbregs_trap_variable(1, 3, 3, false);
1058 }
1059 
1060 ATF_TC(dbregs_dr2_trap_variable_readwrite_read_4bytes);
1061 ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_read_4bytes, tc)
1062 {
1063 	atf_tc_set_md_var(tc, "descr",
1064 	    "Verify that setting trap with DR2 triggers SIGTRAP "
1065 	    "(break on data read/write trap in write 4 bytes mode)");
1066 }
1067 
1068 ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_read_4bytes, tc)
1069 {
1070 	/* 0b11 -- break on data write&read */
1071 	/* 0b11 -- 4 bytes */
1072 
1073 	dbregs_trap_variable(2, 3, 3, false);
1074 }
1075 
1076 ATF_TC(dbregs_dr3_trap_variable_readwrite_read_4bytes);
1077 ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_read_4bytes, tc)
1078 {
1079 	atf_tc_set_md_var(tc, "descr",
1080 	    "Verify that setting trap with DR3 triggers SIGTRAP "
1081 	    "(break on data read/write trap in write 4 bytes mode)");
1082 }
1083 
1084 ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_read_4bytes, tc)
1085 {
1086 	/* 0b11 -- break on data write&read */
1087 	/* 0b11 -- 4 bytes */
1088 
1089 	dbregs_trap_variable(3, 3, 3, false);
1090 }
1091 
1092 #if defined(HAVE_DBREGS)
1093 ATF_TC(dbregs_dr0_trap_code);
1094 ATF_TC_HEAD(dbregs_dr0_trap_code, tc)
1095 {
1096 	atf_tc_set_md_var(tc, "descr",
1097 	    "Verify that setting trap with DR0 triggers SIGTRAP "
1098 	    "(break on code execution trap)");
1099 }
1100 
1101 ATF_TC_BODY(dbregs_dr0_trap_code, tc)
1102 {
1103 	const int exitval = 5;
1104 	const int sigval = SIGSTOP;
1105 	pid_t child, wpid;
1106 #if defined(TWAIT_HAVE_STATUS)
1107 	int status;
1108 #endif
1109 	struct dbreg r1;
1110 	size_t i;
1111 	volatile int watchme = 1;
1112 	union u dr7;
1113 
1114 	struct ptrace_siginfo info;
1115 	memset(&info, 0, sizeof(info));
1116 
1117 	if (!can_we_set_dbregs()) {
1118 		atf_tc_skip("Either run this test as root or set sysctl(3) "
1119 		            "security.models.extensions.user_set_dbregs to 1");
1120 	}
1121 
1122 	dr7.raw = 0;
1123 	dr7.bits.global_dr0_breakpoint = 1;
1124 	dr7.bits.condition_dr0 = 0;	/* 0b00 -- break on code execution */
1125 	dr7.bits.len_dr0 = 0;		/* 0b00 -- 1 byte */
1126 
1127 	DPRINTF("Before forking process PID=%d\n", getpid());
1128 	SYSCALL_REQUIRE((child = fork()) != -1);
1129 	if (child == 0) {
1130 		DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1131 		FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1132 
1133 		DPRINTF("Before raising %s from child\n", strsignal(sigval));
1134 		FORKEE_ASSERT(raise(sigval) == 0);
1135 
1136 		printf("check_happy(%d)=%d\n", watchme, check_happy(watchme));
1137 
1138 		DPRINTF("Before raising %s from child\n", strsignal(sigval));
1139 		FORKEE_ASSERT(raise(sigval) == 0);
1140 
1141 		DPRINTF("Before exiting of the child process\n");
1142 		_exit(exitval);
1143 	}
1144 	DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1145 
1146 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1147 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1148 
1149 	validate_status_stopped(status, sigval);
1150 
1151 	DPRINTF("Call GETDBREGS for the child process (r1)\n");
1152 	SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1153 
1154 	DPRINTF("State of the debug registers (r1):\n");
1155 	for (i = 0; i < __arraycount(r1.dr); i++)
1156 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1157 
1158 	r1.dr[0] = (long)(intptr_t)check_happy;
1159 	DPRINTF("Set DR0 (r1.dr[0]) to new value %" PRIxREGISTER "\n",
1160 	    r1.dr[0]);
1161 
1162 	r1.dr[7] = dr7.raw;
1163 	DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1164 	    r1.dr[7]);
1165 
1166 	DPRINTF("New state of the debug registers (r1):\n");
1167 	for (i = 0; i < __arraycount(r1.dr); i++)
1168 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1169 
1170 	DPRINTF("Call SETDBREGS for the child process (r1)\n");
1171 	SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1172 
1173 	DPRINTF("Call CONTINUE for the child process\n");
1174 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1175 
1176 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1177 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1178 
1179 	validate_status_stopped(status, SIGTRAP);
1180 
1181 	DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
1182 	SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
1183 
1184 	DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
1185 	DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
1186 	    info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
1187 	    info.psi_siginfo.si_errno);
1188 
1189 	DPRINTF("Before checking siginfo_t\n");
1190 	ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, SIGTRAP);
1191 	ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_DBREG);
1192 
1193 	DPRINTF("Remove code trap from check_happy=%p\n", check_happy);
1194 	dr7.bits.global_dr0_breakpoint = 0;
1195 	r1.dr[7] = dr7.raw;
1196 	DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1197 	    r1.dr[7]);
1198 
1199 	DPRINTF("Call SETDBREGS for the child process (r1)\n");
1200 	SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1201 
1202 	DPRINTF("Call CONTINUE for the child process\n");
1203 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1204 
1205 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1206 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1207 
1208 	validate_status_stopped(status, sigval);
1209 
1210 	DPRINTF("Before resuming the child process where it left off and "
1211 	    "without signal to be sent\n");
1212 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1213 
1214 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1215 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1216 
1217 	validate_status_exited(status, exitval);
1218 
1219 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1220 	TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1221 }
1222 #endif
1223 
1224 #if defined(HAVE_DBREGS)
1225 ATF_TC(dbregs_dr1_trap_code);
1226 ATF_TC_HEAD(dbregs_dr1_trap_code, tc)
1227 {
1228 	atf_tc_set_md_var(tc, "descr",
1229 	    "Verify that setting trap with DR1 triggers SIGTRAP "
1230 	    "(break on code execution trap)");
1231 }
1232 
1233 ATF_TC_BODY(dbregs_dr1_trap_code, tc)
1234 {
1235 	const int exitval = 5;
1236 	const int sigval = SIGSTOP;
1237 	pid_t child, wpid;
1238 #if defined(TWAIT_HAVE_STATUS)
1239 	int status;
1240 #endif
1241 	struct dbreg r1;
1242 	size_t i;
1243 	volatile int watchme = 1;
1244 	union u dr7;
1245 
1246 	struct ptrace_siginfo info;
1247 	memset(&info, 0, sizeof(info));
1248 
1249 	if (!can_we_set_dbregs()) {
1250 		atf_tc_skip("Either run this test as root or set sysctl(3) "
1251 		            "security.models.extensions.user_set_dbregs to 1");
1252 	}
1253 
1254 	dr7.raw = 0;
1255 	dr7.bits.global_dr1_breakpoint = 1;
1256 	dr7.bits.condition_dr1 = 0;	/* 0b00 -- break on code execution */
1257 	dr7.bits.len_dr1 = 0;		/* 0b00 -- 1 byte */
1258 
1259 	DPRINTF("Before forking process PID=%d\n", getpid());
1260 	SYSCALL_REQUIRE((child = fork()) != -1);
1261 	if (child == 0) {
1262 		DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1263 		FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1264 
1265 		DPRINTF("Before raising %s from child\n", strsignal(sigval));
1266 		FORKEE_ASSERT(raise(sigval) == 0);
1267 
1268 		printf("check_happy(%d)=%d\n", watchme, check_happy(watchme));
1269 
1270 		DPRINTF("Before raising %s from child\n", strsignal(sigval));
1271 		FORKEE_ASSERT(raise(sigval) == 0);
1272 
1273 		DPRINTF("Before exiting of the child process\n");
1274 		_exit(exitval);
1275 	}
1276 	DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1277 
1278 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1279 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1280 
1281 	validate_status_stopped(status, sigval);
1282 
1283 	DPRINTF("Call GETDBREGS for the child process (r1)\n");
1284 	SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1285 
1286 	DPRINTF("State of the debug registers (r1):\n");
1287 	for (i = 0; i < __arraycount(r1.dr); i++)
1288 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1289 
1290 	r1.dr[1] = (long)(intptr_t)check_happy;
1291 	DPRINTF("Set DR1 (r1.dr[1]) to new value %" PRIxREGISTER "\n",
1292 	    r1.dr[1]);
1293 
1294 	r1.dr[7] = dr7.raw;
1295 	DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1296 	    r1.dr[7]);
1297 
1298 	DPRINTF("New state of the debug registers (r1):\n");
1299 	for (i = 0; i < __arraycount(r1.dr); i++)
1300 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1301 
1302 	DPRINTF("Call SETDBREGS for the child process (r1)\n");
1303 	SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1304 
1305 	DPRINTF("Call CONTINUE for the child process\n");
1306 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1307 
1308 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1309 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1310 
1311 	validate_status_stopped(status, SIGTRAP);
1312 
1313 	DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
1314 	SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
1315 
1316 	DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
1317 	DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
1318 	    info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
1319 	    info.psi_siginfo.si_errno);
1320 
1321 	DPRINTF("Before checking siginfo_t\n");
1322 	ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, SIGTRAP);
1323 	ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_DBREG);
1324 
1325 	DPRINTF("Remove code trap from check_happy=%p\n", check_happy);
1326 	dr7.bits.global_dr1_breakpoint = 0;
1327 	r1.dr[7] = dr7.raw;
1328 	DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1329 	    r1.dr[7]);
1330 
1331 	DPRINTF("Call SETDBREGS for the child process (r1)\n");
1332 	SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1333 
1334 	DPRINTF("Call CONTINUE for the child process\n");
1335 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1336 
1337 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1338 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1339 
1340 	validate_status_stopped(status, sigval);
1341 
1342 	DPRINTF("Before resuming the child process where it left off and "
1343 	    "without signal to be sent\n");
1344 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1345 
1346 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1347 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1348 
1349 	validate_status_exited(status, exitval);
1350 
1351 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1352 	TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1353 }
1354 #endif
1355 
1356 #if defined(HAVE_DBREGS)
1357 ATF_TC(dbregs_dr2_trap_code);
1358 ATF_TC_HEAD(dbregs_dr2_trap_code, tc)
1359 {
1360 	atf_tc_set_md_var(tc, "descr",
1361 	    "Verify that setting trap with DR2 triggers SIGTRAP "
1362 	    "(break on code execution trap)");
1363 }
1364 
1365 ATF_TC_BODY(dbregs_dr2_trap_code, tc)
1366 {
1367 	const int exitval = 5;
1368 	const int sigval = SIGSTOP;
1369 	pid_t child, wpid;
1370 #if defined(TWAIT_HAVE_STATUS)
1371 	int status;
1372 #endif
1373 	struct dbreg r1;
1374 	size_t i;
1375 	volatile int watchme = 1;
1376 	union u dr7;
1377 
1378 	struct ptrace_siginfo info;
1379 	memset(&info, 0, sizeof(info));
1380 
1381 	if (!can_we_set_dbregs()) {
1382 		atf_tc_skip("Either run this test as root or set sysctl(3) "
1383 		            "security.models.extensions.user_set_dbregs to 1");
1384 	}
1385 
1386 	dr7.raw = 0;
1387 	dr7.bits.global_dr2_breakpoint = 1;
1388 	dr7.bits.condition_dr2 = 0;	/* 0b00 -- break on code execution */
1389 	dr7.bits.len_dr2 = 0;		/* 0b00 -- 1 byte */
1390 
1391 	DPRINTF("Before forking process PID=%d\n", getpid());
1392 	SYSCALL_REQUIRE((child = fork()) != -1);
1393 	if (child == 0) {
1394 		DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1395 		FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1396 
1397 		DPRINTF("Before raising %s from child\n", strsignal(sigval));
1398 		FORKEE_ASSERT(raise(sigval) == 0);
1399 
1400 		printf("check_happy(%d)=%d\n", watchme, check_happy(watchme));
1401 
1402 		DPRINTF("Before raising %s from child\n", strsignal(sigval));
1403 		FORKEE_ASSERT(raise(sigval) == 0);
1404 
1405 		DPRINTF("Before exiting of the child process\n");
1406 		_exit(exitval);
1407 	}
1408 	DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1409 
1410 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1411 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1412 
1413 	validate_status_stopped(status, sigval);
1414 
1415 	DPRINTF("Call GETDBREGS for the child process (r1)\n");
1416 	SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1417 
1418 	DPRINTF("State of the debug registers (r1):\n");
1419 	for (i = 0; i < __arraycount(r1.dr); i++)
1420 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1421 
1422 	r1.dr[2] = (long)(intptr_t)check_happy;
1423 	DPRINTF("Set DR2 (r1.dr[2]) to new value %" PRIxREGISTER "\n",
1424 	    r1.dr[2]);
1425 
1426 	r1.dr[7] = dr7.raw;
1427 	DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1428 	    r1.dr[7]);
1429 
1430 	DPRINTF("New state of the debug registers (r1):\n");
1431 	for (i = 0; i < __arraycount(r1.dr); i++)
1432 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1433 
1434 	DPRINTF("Call SETDBREGS for the child process (r1)\n");
1435 	SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1436 
1437 	DPRINTF("Call CONTINUE for the child process\n");
1438 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1439 
1440 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1441 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1442 
1443 	validate_status_stopped(status, SIGTRAP);
1444 
1445 	DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
1446 	SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
1447 
1448 	DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
1449 	DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
1450 	    info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
1451 	    info.psi_siginfo.si_errno);
1452 
1453 	DPRINTF("Before checking siginfo_t\n");
1454 	ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, SIGTRAP);
1455 	ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_DBREG);
1456 
1457 	DPRINTF("Remove code trap from check_happy=%p\n", check_happy);
1458 	dr7.bits.global_dr2_breakpoint = 0;
1459 	r1.dr[7] = dr7.raw;
1460 	DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1461 	    r1.dr[7]);
1462 
1463 	DPRINTF("Call SETDBREGS for the child process (r1)\n");
1464 	SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1465 
1466 	DPRINTF("Call CONTINUE for the child process\n");
1467 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1468 
1469 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1470 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1471 
1472 	validate_status_stopped(status, sigval);
1473 
1474 	DPRINTF("Before resuming the child process where it left off and "
1475 	    "without signal to be sent\n");
1476 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1477 
1478 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1479 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1480 
1481 	validate_status_exited(status, exitval);
1482 
1483 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1484 	TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1485 }
1486 #endif
1487 
1488 #if defined(HAVE_DBREGS)
1489 ATF_TC(dbregs_dr3_trap_code);
1490 ATF_TC_HEAD(dbregs_dr3_trap_code, tc)
1491 {
1492 	atf_tc_set_md_var(tc, "descr",
1493 	    "Verify that setting trap with DR3 triggers SIGTRAP "
1494 	    "(break on code execution trap)");
1495 }
1496 
1497 ATF_TC_BODY(dbregs_dr3_trap_code, tc)
1498 {
1499 	const int exitval = 5;
1500 	const int sigval = SIGSTOP;
1501 	pid_t child, wpid;
1502 #if defined(TWAIT_HAVE_STATUS)
1503 	int status;
1504 #endif
1505 	struct dbreg r1;
1506 	size_t i;
1507 	volatile int watchme = 1;
1508 	union u dr7;
1509 
1510 	struct ptrace_siginfo info;
1511 	memset(&info, 0, sizeof(info));
1512 
1513 	if (!can_we_set_dbregs()) {
1514 		atf_tc_skip("Either run this test as root or set sysctl(3) "
1515 		            "security.models.extensions.user_set_dbregs to 1");
1516 	}
1517 
1518 	dr7.raw = 0;
1519 	dr7.bits.global_dr3_breakpoint = 1;
1520 	dr7.bits.condition_dr3 = 0;	/* 0b00 -- break on code execution */
1521 	dr7.bits.len_dr3 = 0;		/* 0b00 -- 1 byte */
1522 
1523 	DPRINTF("Before forking process PID=%d\n", getpid());
1524 	SYSCALL_REQUIRE((child = fork()) != -1);
1525 	if (child == 0) {
1526 		DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1527 		FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1528 
1529 		DPRINTF("Before raising %s from child\n", strsignal(sigval));
1530 		FORKEE_ASSERT(raise(sigval) == 0);
1531 
1532 		printf("check_happy(%d)=%d\n", watchme, check_happy(watchme));
1533 
1534 		DPRINTF("Before raising %s from child\n", strsignal(sigval));
1535 		FORKEE_ASSERT(raise(sigval) == 0);
1536 
1537 		DPRINTF("Before exiting of the child process\n");
1538 		_exit(exitval);
1539 	}
1540 	DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1541 
1542 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1543 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1544 
1545 	validate_status_stopped(status, sigval);
1546 
1547 	DPRINTF("Call GETDBREGS for the child process (r1)\n");
1548 	SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1549 
1550 	DPRINTF("State of the debug registers (r1):\n");
1551 	for (i = 0; i < __arraycount(r1.dr); i++)
1552 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1553 
1554 	r1.dr[3] = (long)(intptr_t)check_happy;
1555 	DPRINTF("Set DR3 (r1.dr[3]) to new value %" PRIxREGISTER "\n",
1556 	    r1.dr[3]);
1557 
1558 	r1.dr[7] = dr7.raw;
1559 	DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1560 	    r1.dr[7]);
1561 
1562 	DPRINTF("New state of the debug registers (r1):\n");
1563 	for (i = 0; i < __arraycount(r1.dr); i++)
1564 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1565 
1566 	DPRINTF("Call SETDBREGS for the child process (r1)\n");
1567 	SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1568 
1569 	DPRINTF("Call CONTINUE for the child process\n");
1570 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1571 
1572 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1573 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1574 
1575 	validate_status_stopped(status, SIGTRAP);
1576 
1577 	DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
1578 	SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
1579 
1580 	DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
1581 	DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
1582 	    info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
1583 	    info.psi_siginfo.si_errno);
1584 
1585 	DPRINTF("Before checking siginfo_t\n");
1586 	ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, SIGTRAP);
1587 	ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_DBREG);
1588 
1589 	DPRINTF("Remove code trap from check_happy=%p\n", check_happy);
1590 	dr7.bits.global_dr3_breakpoint = 0;
1591 	r1.dr[7] = dr7.raw;
1592 	DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1593 	    r1.dr[7]);
1594 
1595 	DPRINTF("Call SETDBREGS for the child process (r1)\n");
1596 	SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1597 
1598 	DPRINTF("Call CONTINUE for the child process\n");
1599 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1600 
1601 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1602 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1603 
1604 	validate_status_stopped(status, sigval);
1605 
1606 	DPRINTF("Before resuming the child process where it left off and "
1607 	    "without signal to be sent\n");
1608 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1609 
1610 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1611 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1612 
1613 	validate_status_exited(status, exitval);
1614 
1615 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1616 	TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1617 }
1618 #endif
1619 
1620 volatile lwpid_t x86_the_lwp_id = 0;
1621 
1622 static void __used
1623 x86_lwp_main_func(void *arg)
1624 {
1625 	x86_the_lwp_id = _lwp_self();
1626 	_lwp_exit();
1627 }
1628 
1629 static void
1630 dbregs_dont_inherit_lwp(int reg)
1631 {
1632 	const int exitval = 5;
1633 	const int sigval = SIGSTOP;
1634 	pid_t child, wpid;
1635 #if defined(TWAIT_HAVE_STATUS)
1636 	int status;
1637 #endif
1638 	ptrace_state_t state;
1639 	const int slen = sizeof(state);
1640 	ptrace_event_t event;
1641 	const int elen = sizeof(event);
1642 	ucontext_t uc;
1643 	lwpid_t lid;
1644 	static const size_t ssize = 16*1024;
1645 	void *stack;
1646 	size_t i;
1647 	struct dbreg r1;
1648 	struct dbreg r2;
1649 
1650 	if (!can_we_set_dbregs()) {
1651 		atf_tc_skip("Either run this test as root or set sysctl(3) "
1652 		            "security.models.extensions.user_set_dbregs to 1");
1653 	}
1654 
1655 	DPRINTF("Before forking process PID=%d\n", getpid());
1656 	SYSCALL_REQUIRE((child = fork()) != -1);
1657 	if (child == 0) {
1658 		DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1659 		FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1660 
1661 		DPRINTF("Before raising %s from child\n", strsignal(sigval));
1662 		FORKEE_ASSERT(raise(sigval) == 0);
1663 
1664 		DPRINTF("Before allocating memory for stack in child\n");
1665 		FORKEE_ASSERT((stack = malloc(ssize)) != NULL);
1666 
1667 		DPRINTF("Before making context for new lwp in child\n");
1668 		_lwp_makecontext(&uc, x86_lwp_main_func, NULL, NULL, stack,
1669 		    ssize);
1670 
1671 		DPRINTF("Before creating new in child\n");
1672 		FORKEE_ASSERT(_lwp_create(&uc, 0, &lid) == 0);
1673 
1674 		DPRINTF("Before waiting for lwp %d to exit\n", lid);
1675 		FORKEE_ASSERT(_lwp_wait(lid, NULL) == 0);
1676 
1677 		DPRINTF("Before verifying that reported %d and running lid %d "
1678 		    "are the same\n", lid, x86_the_lwp_id);
1679 		FORKEE_ASSERT_EQ(lid, x86_the_lwp_id);
1680 
1681 		DPRINTF("Before exiting of the child process\n");
1682 		_exit(exitval);
1683 	}
1684 	DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1685 
1686 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1687 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1688 
1689 	validate_status_stopped(status, sigval);
1690 
1691 	DPRINTF("Set empty EVENT_MASK for the child %d\n", child);
1692 	event.pe_set_event = PTRACE_LWP_CREATE;
1693 	SYSCALL_REQUIRE(ptrace(PT_SET_EVENT_MASK, child, &event, elen) != -1);
1694 
1695 	DPRINTF("Call GETDBREGS for the child process (r1)\n");
1696 	SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1697 
1698 	DPRINTF("State of the debug registers (r1):\n");
1699 	for (i = 0; i < __arraycount(r1.dr); i++)
1700 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1701 
1702 	r1.dr[reg] = (long)(intptr_t)check_happy;
1703 	DPRINTF("Set DR%d (r1.dr[%d]) to new value %" PRIxREGISTER "\n",
1704 	    reg, reg, r1.dr[0]);
1705 
1706 	DPRINTF("New state of the debug registers (r1):\n");
1707 	for (i = 0; i < __arraycount(r1.dr); i++)
1708 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1709 
1710 	DPRINTF("Call SETDBREGS for the child process (r1)\n");
1711 	SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1712 
1713 	DPRINTF("Before resuming the child process where it left off and "
1714 	    "without signal to be sent\n");
1715 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1716 
1717 	DPRINTF("Before calling %s() for the child - expected stopped "
1718 	    "SIGTRAP\n", TWAIT_FNAME);
1719 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1720 
1721 	validate_status_stopped(status, SIGTRAP);
1722 
1723 	SYSCALL_REQUIRE(ptrace(PT_GET_PROCESS_STATE, child, &state, slen) != -1);
1724 
1725 	ATF_REQUIRE_EQ(state.pe_report_event, PTRACE_LWP_CREATE);
1726 
1727 	lid = state.pe_lwp;
1728 	DPRINTF("Reported PTRACE_LWP_CREATE event with lid %d\n", lid);
1729 
1730 	DPRINTF("Call GETDBREGS for the child process new lwp (r2)\n");
1731 	SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r2, lid) != -1);
1732 
1733 	DPRINTF("State of the debug registers (r2):\n");
1734 	for (i = 0; i < __arraycount(r2.dr); i++)
1735 		DPRINTF("r2[%zu]=%" PRIxREGISTER "\n", i, r2.dr[i]);
1736 
1737 	DPRINTF("Assert that (r1) and (r2) are not the same\n");
1738 	ATF_REQUIRE(memcmp(&r1, &r2, sizeof(r1)) != 0);
1739 
1740 	DPRINTF("Before resuming the child process where it left off and "
1741 	    "without signal to be sent\n");
1742 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1743 
1744 	DPRINTF("Before calling %s() for the child - expected exited\n",
1745 	    TWAIT_FNAME);
1746 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1747 
1748 	validate_status_exited(status, exitval);
1749 
1750 	DPRINTF("Before calling %s() for the child - expected no process\n",
1751 	    TWAIT_FNAME);
1752 	TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1753 }
1754 
1755 ATF_TC(dbregs_dr0_dont_inherit_lwp);
1756 ATF_TC_HEAD(dbregs_dr0_dont_inherit_lwp, tc)
1757 {
1758 	atf_tc_set_md_var(tc, "descr",
1759 	    "Verify that 1 LWP creation is intercepted by ptrace(2) with "
1760 	    "EVENT_MASK set to PTRACE_LWP_CREATE and Debug Register 0 from "
1761 	    "the forker thread is not inherited");
1762 }
1763 
1764 ATF_TC_BODY(dbregs_dr0_dont_inherit_lwp, tc)
1765 {
1766 	dbregs_dont_inherit_lwp(0);
1767 }
1768 
1769 ATF_TC(dbregs_dr1_dont_inherit_lwp);
1770 ATF_TC_HEAD(dbregs_dr1_dont_inherit_lwp, tc)
1771 {
1772 	atf_tc_set_md_var(tc, "descr",
1773 	    "Verify that 1 LWP creation is intercepted by ptrace(2) with "
1774 	    "EVENT_MASK set to PTRACE_LWP_CREATE and Debug Register 1 from "
1775 	    "the forker thread is not inherited");
1776 }
1777 
1778 ATF_TC_BODY(dbregs_dr1_dont_inherit_lwp, tc)
1779 {
1780 	dbregs_dont_inherit_lwp(1);
1781 }
1782 
1783 ATF_TC(dbregs_dr2_dont_inherit_lwp);
1784 ATF_TC_HEAD(dbregs_dr2_dont_inherit_lwp, tc)
1785 {
1786 	atf_tc_set_md_var(tc, "descr",
1787 	    "Verify that 1 LWP creation is intercepted by ptrace(2) with "
1788 	    "EVENT_MASK set to PTRACE_LWP_CREATE and Debug Register 2 from "
1789 	    "the forker thread is not inherited");
1790 }
1791 
1792 ATF_TC_BODY(dbregs_dr2_dont_inherit_lwp, tc)
1793 {
1794 	dbregs_dont_inherit_lwp(2);
1795 }
1796 
1797 ATF_TC(dbregs_dr3_dont_inherit_lwp);
1798 ATF_TC_HEAD(dbregs_dr3_dont_inherit_lwp, tc)
1799 {
1800 	atf_tc_set_md_var(tc, "descr",
1801 	    "Verify that 1 LWP creation is intercepted by ptrace(2) with "
1802 	    "EVENT_MASK set to PTRACE_LWP_CREATE and Debug Register 3 from "
1803 	    "the forker thread is not inherited");
1804 }
1805 
1806 ATF_TC_BODY(dbregs_dr3_dont_inherit_lwp, tc)
1807 {
1808 	dbregs_dont_inherit_lwp(3);
1809 }
1810 
1811 static void
1812 dbregs_dont_inherit_execve(int reg)
1813 {
1814 	const int sigval = SIGTRAP;
1815 	pid_t child, wpid;
1816 #if defined(TWAIT_HAVE_STATUS)
1817 	int status;
1818 #endif
1819 	size_t i;
1820 	struct dbreg r1;
1821 	struct dbreg r2;
1822 
1823 	struct ptrace_siginfo info;
1824 	memset(&info, 0, sizeof(info));
1825 
1826 	if (!can_we_set_dbregs()) {
1827 		atf_tc_skip("Either run this test as root or set sysctl(3) "
1828 		            "security.models.extensions.user_set_dbregs to 1");
1829 	}
1830 
1831 	DPRINTF("Before forking process PID=%d\n", getpid());
1832 	SYSCALL_REQUIRE((child = fork()) != -1);
1833 	if (child == 0) {
1834 		DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1835 		FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1836 
1837 		DPRINTF("Before raising %s from child\n", strsignal(sigval));
1838 		FORKEE_ASSERT(raise(sigval) == 0);
1839 
1840 		DPRINTF("Before calling execve(2) from child\n");
1841 		execlp("/bin/echo", "/bin/echo", NULL);
1842 
1843 		FORKEE_ASSERT(0 && "Not reached");
1844 	}
1845 	DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1846 
1847 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1848 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1849 
1850 	validate_status_stopped(status, sigval);
1851 
1852 	DPRINTF("Call GETDBREGS for the child process (r1)\n");
1853 	SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1854 
1855 	DPRINTF("State of the debug registers (r1):\n");
1856 	for (i = 0; i < __arraycount(r1.dr); i++)
1857 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1858 
1859 	r1.dr[reg] = (long)(intptr_t)check_happy;
1860 	DPRINTF("Set DR%d (r1.dr[%d]) to new value %" PRIxREGISTER "\n",
1861 	    reg, reg, r1.dr[reg]);
1862 
1863 	DPRINTF("New state of the debug registers (r1):\n");
1864 	for (i = 0; i < __arraycount(r1.dr); i++)
1865 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1866 
1867 	DPRINTF("Call SETDBREGS for the child process (r1)\n");
1868 	SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1869 
1870 	DPRINTF("Before resuming the child process where it left off and "
1871 	    "without signal to be sent\n");
1872 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1873 
1874 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1875 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1876 
1877 	validate_status_stopped(status, sigval);
1878 
1879 	DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
1880 	SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
1881 
1882 	DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
1883 	DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
1884 	    info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
1885 	    info.psi_siginfo.si_errno);
1886 
1887 	ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, sigval);
1888 	ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_EXEC);
1889 
1890 	DPRINTF("Call GETDBREGS for the child process after execve(2)\n");
1891 	SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r2, 0) != -1);
1892 
1893 	DPRINTF("State of the debug registers (r2):\n");
1894 	for (i = 0; i < __arraycount(r2.dr); i++)
1895 		DPRINTF("r2[%zu]=%" PRIxREGISTER "\n", i, r2.dr[i]);
1896 
1897 	DPRINTF("Assert that (r1) and (r2) are not the same\n");
1898 	ATF_REQUIRE(memcmp(&r1, &r2, sizeof(r1)) != 0);
1899 
1900 	DPRINTF("Before resuming the child process where it left off and "
1901 	    "without signal to be sent\n");
1902 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1903 
1904 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1905 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1906 
1907 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1908 	TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1909 }
1910 
1911 ATF_TC(dbregs_dr0_dont_inherit_execve);
1912 ATF_TC_HEAD(dbregs_dr0_dont_inherit_execve, tc)
1913 {
1914 	atf_tc_set_md_var(tc, "descr",
1915 	    "Verify that execve(2) is intercepted by tracer and Debug "
1916 	    "Register 0 is reset");
1917 }
1918 
1919 ATF_TC_BODY(dbregs_dr0_dont_inherit_execve, tc)
1920 {
1921 	dbregs_dont_inherit_execve(0);
1922 }
1923 
1924 ATF_TC(dbregs_dr1_dont_inherit_execve);
1925 ATF_TC_HEAD(dbregs_dr1_dont_inherit_execve, tc)
1926 {
1927 	atf_tc_set_md_var(tc, "descr",
1928 	    "Verify that execve(2) is intercepted by tracer and Debug "
1929 	    "Register 1 is reset");
1930 }
1931 
1932 ATF_TC_BODY(dbregs_dr1_dont_inherit_execve, tc)
1933 {
1934 	dbregs_dont_inherit_execve(1);
1935 }
1936 
1937 ATF_TC(dbregs_dr2_dont_inherit_execve);
1938 ATF_TC_HEAD(dbregs_dr2_dont_inherit_execve, tc)
1939 {
1940 	atf_tc_set_md_var(tc, "descr",
1941 	    "Verify that execve(2) is intercepted by tracer and Debug "
1942 	    "Register 2 is reset");
1943 }
1944 
1945 ATF_TC_BODY(dbregs_dr2_dont_inherit_execve, tc)
1946 {
1947 	dbregs_dont_inherit_execve(2);
1948 }
1949 
1950 ATF_TC(dbregs_dr3_dont_inherit_execve);
1951 ATF_TC_HEAD(dbregs_dr3_dont_inherit_execve, tc)
1952 {
1953 	atf_tc_set_md_var(tc, "descr",
1954 	    "Verify that execve(2) is intercepted by tracer and Debug "
1955 	    "Register 3 is reset");
1956 }
1957 
1958 ATF_TC_BODY(dbregs_dr3_dont_inherit_execve, tc)
1959 {
1960 	dbregs_dont_inherit_execve(3);
1961 }
1962 
1963 /// ----------------------------------------------------------------------------
1964 
1965 ATF_TC(x86_cve_2018_8897);
1966 ATF_TC_HEAD(x86_cve_2018_8897, tc)
1967 {
1968 	atf_tc_set_md_var(tc, "descr",
1969 	    "Verify mitigation for CVE-2018-8897 (POP SS debug exception)");
1970 }
1971 
1972 #define X86_CVE_2018_8897_PAGE 0x5000 /* page addressable by 32-bit registers */
1973 
1974 static void
1975 x86_cve_2018_8897_trigger(void)
1976 {
1977 	/*
1978 	 * A function to trigger the POP SS (CVE-2018-8897) vulnerability
1979 	 *
1980 	 * ifdef __x86_64__
1981 	 *
1982 	 * We need to switch to 32-bit mode execution on 64-bit kernel.
1983 	 * This is achieved with far jump instruction and GDT descriptor
1984 	 * set to 32-bit CS selector. The 32-bit CS selector is kernel
1985 	 * specific, in the NetBSD case registered as GUCODE32_SEL
1986 	 * that is equal to (14 (decimal) << 3) with GDT and user
1987 	 * privilege level (this makes it 0x73).
1988 	 *
1989 	 * In UNIX as(1) assembly x86_64 far jump is coded as ljmp.
1990 	 * amd64 ljmp requires an indirect address with cs:RIP.
1991 	 *
1992 	 * When we are running in 32-bit mode, it's similar to the
1993 	 * mode as if the binary had been launched in netbsd32.
1994 	 *
1995 	 * There are two versions of this exploit, one with RIP
1996 	 * relative code and the other with static addresses.
1997 	 * The first one is PIE code aware, the other no-PIE one.
1998 	 *
1999 	 *
2000 	 * After switching to the 32-bit mode we can move on to the remaining
2001 	 * part of the exploit.
2002 	 *
2003 	 * endif //  __x86_64__
2004 	 *
2005 	 * Set the stack pointer to the page we allocated earlier. Remember
2006 	 * that we put an SS selector exactly at this address, so we can pop.
2007 	 *
2008 	 * movl    $0x5000,%esp
2009 	 *
2010 	 * Pop the SS selector off the stack. This reloads the SS selector,
2011 	 * which is fine. Remember that we set DR0 at address 0x5000, which
2012 	 * we are now reading. Therefore, on this instruction, the CPU will
2013 	 * raise a #DB exception.
2014 	 *
2015 	 * But the "pop %ss" instruction is special: it blocks exceptions
2016 	 * until the next instruction is executed. So the #DB that we just
2017 	 * raised is actually blocked.
2018 	 *
2019 	 * pop %ss
2020 	 *
2021 	 * We are still here, and didn't receive the #DB. After we execute
2022 	 * this instruction, the effect of "pop %ss" will disappear, and
2023 	 * we will receive the #DB for real.
2024 	 *
2025 	 * int $4
2026 	 *
2027 	 * Here the bug happens. We executed "int $4", so we entered the
2028 	 * kernel, with interrupts disabled. The #DB that was pending is
2029 	 * received. But, it is received immediately in kernel mode, and is
2030 	 * _NOT_ received when interrupts are enabled again.
2031 	 *
2032 	 * It means that, in the first instruction of the $4 handler, we
2033 	 * think we are safe with interrupts disabled. But we aren't, and
2034 	 * just got interrupted.
2035 	 *
2036 	 * The new interrupt handler doesn't handle this particular context:
2037 	 * we are entered in kernel mode, the previous context was kernel
2038 	 * mode too but it still had the user context loaded.
2039 	 *
2040 	 * We find ourselves not doing a 'swapgs'. At the end of the day, it
2041 	 * means that we call trap() with a curcpu() that is fully
2042 	 * controllable by userland. From then on, it is easy to escalate
2043 	 * privileges.
2044 	 *
2045 	 * With SVS it also means we don't switch CR3, so this results in a
2046 	 * triple fault, which this time cannot be turned to a privilege
2047 	 * escalation.
2048 	 */
2049 
2050 #if __x86_64__
2051 #if __PIE__
2052 	void *csRIP;
2053 
2054 	csRIP = malloc(sizeof(int) + sizeof(short));
2055 	FORKEE_ASSERT(csRIP != NULL);
2056 
2057 	__asm__ __volatile__(
2058 		"	leal 24(%%eip), %%eax\n\t"
2059 		"	movq %0, %%rdx\n\t"
2060 		"	movl %%eax, (%%rdx)\n\t"
2061 		"	movw $0x73, 4(%%rdx)\n\t"
2062 		"	movq %1, %%rax\n\t"
2063 		"	ljmp *(%%rax)\n\t"
2064 		"	.code32\n\t"
2065 		"	movl $0x5000, %%esp\n\t"
2066 		"	pop %%ss\n\t"
2067 		"	int $4\n\t"
2068 		"	.code64\n\t"
2069 		: "=m"(csRIP)
2070 		: "m"(csRIP)
2071 		: "%rax", "%rdx", "%rsp"
2072 		);
2073 #else /* !__PIE__ */
2074 	__asm__ __volatile__(
2075 		"       movq $farjmp32, %%rax\n\t"
2076 		"       ljmp *(%%rax)\n\t"
2077 		"farjmp32:\n\t"
2078 		"       .long trigger32\n\t"
2079 		"       .word 0x73\n\t"
2080 		"       .code32\n\t"
2081 		"trigger32:\n\t"
2082 		"       movl $0x5000, %%esp\n\t"
2083 		"       pop %%ss\n\t"
2084 		"       int $4\n\t"
2085 		"       .code64\n\t"
2086 		:
2087 		:
2088 		: "%rax", "%rsp"
2089 		);
2090 #endif
2091 #elif __i386__
2092 	__asm__ __volatile__(
2093 		"movl $0x5000, %%esp\n\t"
2094 		"pop %%ss\n\t"
2095 		"int $4\n\t"
2096 		:
2097 		:
2098 		: "%esp"
2099 		);
2100 #endif
2101 }
2102 
2103 ATF_TC_BODY(x86_cve_2018_8897, tc)
2104 {
2105 	const int sigval = SIGSTOP;
2106 	pid_t child, wpid;
2107 #if defined(TWAIT_HAVE_STATUS)
2108 	int status;
2109 #endif
2110 	char *trap_page;
2111 	struct dbreg db;
2112 
2113 
2114 	if (!can_we_set_dbregs()) {
2115 		atf_tc_skip("Either run this test as root or set sysctl(3) "
2116 		            "security.models.extensions.user_set_dbregs to 1");
2117 	}
2118 
2119 	DPRINTF("Before forking process PID=%d\n", getpid());
2120 	SYSCALL_REQUIRE((child = fork()) != -1);
2121 	if (child == 0) {
2122 		DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
2123 		FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
2124 
2125 		trap_page = mmap((void *)X86_CVE_2018_8897_PAGE,
2126 		                 sysconf(_SC_PAGESIZE), PROT_READ|PROT_WRITE,
2127 		                 MAP_FIXED|MAP_ANON|MAP_PRIVATE, -1, 0);
2128 
2129 		/* trigger page fault */
2130 		memset(trap_page, 0, sysconf(_SC_PAGESIZE));
2131 
2132 		// kernel GDT
2133 #if __x86_64__
2134 		/* SS selector (descriptor 9 (0x4f >> 3)) */
2135 		*trap_page = 0x4f;
2136 #elif __i386__
2137 		/* SS selector (descriptor 4 (0x23 >> 3)) */
2138 		*trap_page = 0x23;
2139 #endif
2140 
2141 		DPRINTF("Before raising %s from child\n", strsignal(sigval));
2142 		FORKEE_ASSERT(raise(sigval) == 0);
2143 
2144 		x86_cve_2018_8897_trigger();
2145 
2146 		/* NOTREACHED */
2147 		FORKEE_ASSERTX(0 && "This shall not be reached");
2148 	}
2149 	DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
2150 
2151 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2152 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2153 
2154 	validate_status_stopped(status, sigval);
2155 
2156 	DPRINTF("Call GETDBREGS for the child process\n");
2157 	SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &db, 0) != -1);
2158 
2159 	/*
2160 	 * Set up the dbregs. We put the 0x5000 address in DR0.
2161 	 * It means that, the first time we touch this, the CPU will trigger a
2162 	 * #DB exception.
2163 	 */
2164 	db.dr[0] = X86_CVE_2018_8897_PAGE;
2165 	db.dr[7] = 0x30003;
2166 
2167 	DPRINTF("Call SETDBREGS for the child process\n");
2168 	SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &db, 0) != -1);
2169 
2170 	DPRINTF("Before resuming the child process where it left off and "
2171 	    "without signal to be sent\n");
2172 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
2173 
2174 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2175 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2176 
2177 	// In this test we receive SIGFPE, is this appropriate?
2178 //	validate_status_stopped(status, SIGFPE);
2179 
2180 	DPRINTF("Kill the child process\n");
2181 	SYSCALL_REQUIRE(ptrace(PT_KILL, child, NULL, 0) != -1);
2182 
2183 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2184 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2185 
2186 	validate_status_signaled(status, SIGKILL, 0);
2187 
2188 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2189 	TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
2190 }
2191 
2192 ATF_TC(x86_regs_mm_read);
2193 ATF_TC_HEAD(x86_regs_mm_read, tc)
2194 {
2195 	atf_tc_set_md_var(tc, "descr",
2196 		"Set MMX (mm0..mm7) reg values from debugged program and read "
2197 		"them via PT_GETFPREGS, comparing values against expected.");
2198 }
2199 
2200 __attribute__((target("mmx")))
2201 static __inline void set_mm_regs(const uint64_t mm[])
2202 {
2203 	__asm__ __volatile__(
2204 		"movq    0x00(%0), %%mm0\n\t"
2205 		"movq    0x08(%0), %%mm1\n\t"
2206 		"movq    0x10(%0), %%mm2\n\t"
2207 		"movq    0x18(%0), %%mm3\n\t"
2208 		"movq    0x20(%0), %%mm4\n\t"
2209 		"movq    0x28(%0), %%mm5\n\t"
2210 		"movq    0x30(%0), %%mm6\n\t"
2211 		"movq    0x38(%0), %%mm7\n\t"
2212 		"int3\n\t"
2213 		:
2214 		: "b"(mm)
2215 		: "%mm0", "%mm1", "%mm2", "%mm3", "%mm4", "%mm5", "%mm6", "%mm7"
2216 	);
2217 }
2218 
2219 #if defined(__i386__)
2220 __CTASSERT(sizeof(struct fpreg) == sizeof(struct save87));
2221 #endif
2222 
2223 ATF_TC_BODY(x86_regs_mm_read, tc)
2224 {
2225 	const int exitval = 5;
2226 	pid_t child, wpid;
2227 #if defined(TWAIT_HAVE_STATUS)
2228 	const int sigval = SIGTRAP;
2229 	int status;
2230 #endif
2231 #if defined(__x86_64__)
2232 	struct fpreg fpr;
2233 #else
2234 	/* TODO: replace this with 'struct fpreg' once it becomes non-opaque */
2235 	struct save87 fpr;
2236 #endif
2237 
2238 	const uint64_t mm[] = {
2239 		0x0001020304050607,
2240 		0x1011121314151617,
2241 		0x2021222324252627,
2242 		0x3031323334353637,
2243 		0x4041424344454647,
2244 		0x5051525354555657,
2245 		0x6061626364656667,
2246 		0x7071727374757677,
2247 	};
2248 
2249 	/* verify whether MMX is supported here */
2250 	DPRINTF("Before invoking cpuid\n");
2251 	{
2252 		unsigned int eax, ebx, ecx, edx;
2253 		if (!__get_cpuid(1, &eax, &ebx, &ecx, &edx))
2254 			atf_tc_skip("CPUID is not supported by the CPU");
2255 
2256 		DPRINTF("cpuid: EDX = %08x\n", edx);
2257 
2258 		if (!(edx & bit_MMX))
2259 			atf_tc_skip("MMX is not supported by the CPU");
2260 	}
2261 
2262 	DPRINTF("Before forking process PID=%d\n", getpid());
2263 	SYSCALL_REQUIRE((child = fork()) != -1);
2264 	if (child == 0) {
2265 		DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
2266 		FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
2267 
2268 		DPRINTF("Before running assembly from child\n");
2269 		set_mm_regs(mm);
2270 
2271 		DPRINTF("Before exiting of the child process\n");
2272 		_exit(exitval);
2273 	}
2274 	DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
2275 
2276 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2277 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2278 
2279 	validate_status_stopped(status, sigval);
2280 
2281 	DPRINTF("Call GETFPREGS for the child process\n");
2282 	SYSCALL_REQUIRE(ptrace(PT_GETFPREGS, child, &fpr, 0) != -1);
2283 
2284 #if defined(__x86_64__)
2285 #define MM_REG(n) fpr.fxstate.fx_87_ac[n].r.f87_mantissa
2286 #else
2287 #define MM_REG(n) fpr.s87_ac[n].f87_mantissa
2288 #endif
2289 
2290 	ATF_CHECK_EQ(MM_REG(0), mm[0]);
2291 	ATF_CHECK_EQ(MM_REG(1), mm[1]);
2292 	ATF_CHECK_EQ(MM_REG(2), mm[2]);
2293 	ATF_CHECK_EQ(MM_REG(3), mm[3]);
2294 	ATF_CHECK_EQ(MM_REG(4), mm[4]);
2295 	ATF_CHECK_EQ(MM_REG(5), mm[5]);
2296 	ATF_CHECK_EQ(MM_REG(6), mm[6]);
2297 	ATF_CHECK_EQ(MM_REG(7), mm[7]);
2298 
2299 #undef MM_REG
2300 
2301 	DPRINTF("Before resuming the child process where it left off and "
2302 	    "without signal to be sent\n");
2303 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
2304 
2305 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2306 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2307 
2308 	validate_status_exited(status, exitval);
2309 
2310 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2311 	TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
2312 }
2313 
2314 __attribute__((target("sse")))
2315 static __inline void set_xmm_regs(const void* xmm)
2316 {
2317 	__asm__ __volatile__(
2318 		"movaps   0x00(%0), %%xmm0\n\t"
2319 		"movaps   0x10(%0), %%xmm1\n\t"
2320 		"movaps   0x20(%0), %%xmm2\n\t"
2321 		"movaps   0x30(%0), %%xmm3\n\t"
2322 		"movaps   0x40(%0), %%xmm4\n\t"
2323 		"movaps   0x50(%0), %%xmm5\n\t"
2324 		"movaps   0x60(%0), %%xmm6\n\t"
2325 		"movaps   0x70(%0), %%xmm7\n\t"
2326 #if defined(__x86_64__)
2327 		"movaps   0x80(%0), %%xmm8\n\t"
2328 		"movaps   0x90(%0), %%xmm9\n\t"
2329 		"movaps   0xA0(%0), %%xmm10\n\t"
2330 		"movaps   0xB0(%0), %%xmm11\n\t"
2331 		"movaps   0xC0(%0), %%xmm12\n\t"
2332 		"movaps   0xD0(%0), %%xmm13\n\t"
2333 		"movaps   0xE0(%0), %%xmm14\n\t"
2334 		"movaps   0xF0(%0), %%xmm15\n\t"
2335 #endif
2336 		"int3\n\t"
2337 		:
2338 		: "b"(xmm)
2339 		: "%xmm0", "%xmm1", "%xmm2", "%xmm3", "%xmm4", "%xmm5", "%xmm6",
2340 		"%xmm7"
2341 #if defined(__x86_64__)
2342 		, "%xmm8", "%xmm9", "%xmm10", "%xmm11", "%xmm12", "%xmm13",
2343 		"%xmm14", "%xmm15"
2344 #endif
2345 	);
2346 }
2347 
2348 #if defined(__i386__)
2349 __CTASSERT(sizeof(struct xmmregs) == sizeof(struct fxsave));
2350 #endif
2351 
2352 ATF_TC(x86_regs_xmm_read);
2353 ATF_TC_HEAD(x86_regs_xmm_read, tc)
2354 {
2355 	atf_tc_set_md_var(tc, "descr",
2356 		"Set xmm0..xmm15 (..xmm7 on i386) reg values from debugged program "
2357 		"and read them via PT_GETFPREGS (PT_GETXMMREGS on i386), comparing "
2358 		"values against expected.");
2359 }
2360 
2361 ATF_TC_BODY(x86_regs_xmm_read, tc)
2362 {
2363 	const int exitval = 5;
2364 	pid_t child, wpid;
2365 #if defined(TWAIT_HAVE_STATUS)
2366 	const int sigval = SIGTRAP;
2367 	int status;
2368 #endif
2369 #if defined(__x86_64__)
2370 	struct fpreg fpr;
2371 #else
2372 	/* TODO: use 'struct xmmregs' when it stops being opaque */
2373 	struct fxsave fpr;
2374 #endif
2375 	struct xmmreg* fpr_xmm;
2376 
2377 	const struct {
2378 		uint64_t a, b;
2379 	} xmm[] __aligned(16) = {
2380 		{ 0x0706050403020100, 0x0F0E0D0C0B0A0908, },
2381 		{ 0x0807060504030201, 0x100F0E0D0C0B0A09, },
2382 		{ 0x0908070605040302, 0x11100F0E0D0C0B0A, },
2383 		{ 0x0A09080706050403, 0x1211100F0E0D0C0B, },
2384 		{ 0x0B0A090807060504, 0x131211100F0E0D0C, },
2385 		{ 0x0C0B0A0908070605, 0x14131211100F0E0D, },
2386 		{ 0x0D0C0B0A09080706, 0x1514131211100F0E, },
2387 		{ 0x0E0D0C0B0A090807, 0x161514131211100F, },
2388 #if defined(__x86_64__)
2389 		{ 0x0F0E0D0C0B0A0908, 0x1716151413121110, },
2390 		{ 0x100F0E0D0C0B0A09, 0x1817161514131211, },
2391 		{ 0x11100F0E0D0C0B0A, 0x1918171615141312, },
2392 		{ 0x1211100F0E0D0C0B, 0x1A19181716151413, },
2393 		{ 0x131211100F0E0D0C, 0x1B1A191817161514, },
2394 		{ 0x14131211100F0E0D, 0x1C1B1A1918171615, },
2395 		{ 0x1514131211100F0E, 0x1D1C1B1A19181716, },
2396 		{ 0x161514131211100F, 0x1E1D1C1B1A191817, },
2397 #endif
2398 	};
2399 
2400 	/* verify whether SSE is supported here */
2401 	DPRINTF("Before invoking cpuid\n");
2402 	{
2403 		unsigned int eax, ebx, ecx, edx;
2404 		if (!__get_cpuid(1, &eax, &ebx, &ecx, &edx))
2405 			atf_tc_skip("CPUID is not supported by the CPU");
2406 
2407 		DPRINTF("cpuid: EDX = %08x\n", edx);
2408 
2409 		if (!(edx & bit_SSE))
2410 			atf_tc_skip("SSE is not supported by the CPU");
2411 	}
2412 
2413 	DPRINTF("Before forking process PID=%d\n", getpid());
2414 	SYSCALL_REQUIRE((child = fork()) != -1);
2415 	if (child == 0) {
2416 		DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
2417 		FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
2418 
2419 		DPRINTF("Before running assembly from child\n");
2420 		set_xmm_regs(xmm);
2421 
2422 		DPRINTF("Before exiting of the child process\n");
2423 		_exit(exitval);
2424 	}
2425 	DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
2426 
2427 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2428 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2429 
2430 	validate_status_stopped(status, sigval);
2431 
2432 #if defined(__x86_64__)
2433 	DPRINTF("Call GETFPREGS for the child process\n");
2434 	SYSCALL_REQUIRE(ptrace(PT_GETFPREGS, child, &fpr, 0) != -1);
2435 	fpr_xmm = fpr.fxstate.fx_xmm;
2436 #else
2437 	DPRINTF("Call GETXMMREGS for the child process\n");
2438 	SYSCALL_REQUIRE(ptrace(PT_GETXMMREGS, child, &fpr, 0) != -1);
2439 	fpr_xmm = fpr.fx_xmm;
2440 #endif
2441 
2442 	ATF_CHECK(!memcmp(&fpr_xmm[0], &xmm[0], sizeof(*xmm)));
2443 	ATF_CHECK(!memcmp(&fpr_xmm[1], &xmm[1], sizeof(*xmm)));
2444 	ATF_CHECK(!memcmp(&fpr_xmm[2], &xmm[2], sizeof(*xmm)));
2445 	ATF_CHECK(!memcmp(&fpr_xmm[3], &xmm[3], sizeof(*xmm)));
2446 	ATF_CHECK(!memcmp(&fpr_xmm[4], &xmm[4], sizeof(*xmm)));
2447 	ATF_CHECK(!memcmp(&fpr_xmm[5], &xmm[5], sizeof(*xmm)));
2448 	ATF_CHECK(!memcmp(&fpr_xmm[6], &xmm[6], sizeof(*xmm)));
2449 	ATF_CHECK(!memcmp(&fpr_xmm[7], &xmm[7], sizeof(*xmm)));
2450 #if defined(__x86_64__)
2451 	ATF_CHECK(!memcmp(&fpr_xmm[8], &xmm[8], sizeof(*xmm)));
2452 	ATF_CHECK(!memcmp(&fpr_xmm[9], &xmm[9], sizeof(*xmm)));
2453 	ATF_CHECK(!memcmp(&fpr_xmm[10], &xmm[10], sizeof(*xmm)));
2454 	ATF_CHECK(!memcmp(&fpr_xmm[11], &xmm[11], sizeof(*xmm)));
2455 	ATF_CHECK(!memcmp(&fpr_xmm[12], &xmm[12], sizeof(*xmm)));
2456 	ATF_CHECK(!memcmp(&fpr_xmm[13], &xmm[13], sizeof(*xmm)));
2457 	ATF_CHECK(!memcmp(&fpr_xmm[14], &xmm[14], sizeof(*xmm)));
2458 	ATF_CHECK(!memcmp(&fpr_xmm[15], &xmm[15], sizeof(*xmm)));
2459 #endif
2460 
2461 	DPRINTF("Before resuming the child process where it left off and "
2462 	    "without signal to be sent\n");
2463 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
2464 
2465 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2466 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2467 
2468 	validate_status_exited(status, exitval);
2469 
2470 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2471 	TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
2472 }
2473 /// ----------------------------------------------------------------------------
2474 
2475 #define ATF_TP_ADD_TCS_PTRACE_WAIT_X86() \
2476 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_print); \
2477 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr0); \
2478 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr1); \
2479 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr2); \
2480 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr3); \
2481 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr0_yield); \
2482 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr1_yield); \
2483 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr2_yield); \
2484 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr3_yield); \
2485 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr0_continued); \
2486 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr1_continued); \
2487 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr2_continued); \
2488 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr3_continued); \
2489 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_writeonly_byte); \
2490 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_writeonly_byte); \
2491 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_writeonly_byte); \
2492 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_writeonly_byte); \
2493 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_writeonly_2bytes); \
2494 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_writeonly_2bytes); \
2495 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_writeonly_2bytes); \
2496 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_writeonly_2bytes); \
2497 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_writeonly_4bytes); \
2498 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_writeonly_4bytes); \
2499 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_writeonly_4bytes); \
2500 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_writeonly_4bytes); \
2501 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_write_byte); \
2502 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_write_byte); \
2503 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_write_byte); \
2504 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_write_byte); \
2505 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_write_2bytes); \
2506 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_write_2bytes); \
2507 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_write_2bytes); \
2508 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_write_2bytes); \
2509 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_write_4bytes); \
2510 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_write_4bytes); \
2511 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_write_4bytes); \
2512 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_write_4bytes); \
2513 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_read_byte); \
2514 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_read_byte); \
2515 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_read_byte); \
2516 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_read_byte); \
2517 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_read_2bytes); \
2518 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_read_2bytes); \
2519 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_read_2bytes); \
2520 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_read_2bytes); \
2521 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_read_4bytes); \
2522 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_read_4bytes); \
2523 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_read_4bytes); \
2524 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_read_4bytes); \
2525 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_code); \
2526 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_code); \
2527 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_code); \
2528 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_code); \
2529 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_dont_inherit_lwp); \
2530 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_dont_inherit_lwp); \
2531 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_dont_inherit_lwp); \
2532 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_dont_inherit_lwp); \
2533 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_dont_inherit_execve); \
2534 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_dont_inherit_execve); \
2535 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_dont_inherit_execve); \
2536 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_dont_inherit_execve); \
2537 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, x86_cve_2018_8897); \
2538 	ATF_TP_ADD_TC_HAVE_FPREGS(tp, x86_regs_mm_read); \
2539 	ATF_TP_ADD_TC_HAVE_FPREGS(tp, x86_regs_xmm_read);
2540 #else
2541 #define ATF_TP_ADD_TCS_PTRACE_WAIT_X86()
2542 #endif
2543