xref: /netbsd-src/tests/lib/libc/sys/t_ptrace_x86_wait.h (revision 8a068b749701c8b7e89cc8dc1fc78e0a79b2b4a4)
1 /*	$NetBSD: t_ptrace_x86_wait.h,v 1.22 2020/02/13 18:31:54 tnn Exp $	*/
2 
3 /*-
4  * Copyright (c) 2016, 2017, 2018, 2019 The NetBSD Foundation, Inc.
5  * All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  *
16  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
17  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
18  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
20  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
21  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
22  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
23  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
24  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
25  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
26  * POSSIBILITY OF SUCH DAMAGE.
27  */
28 
29 #if defined(__i386__) || defined(__x86_64__)
30 union u {
31 	unsigned long raw;
32 	struct {
33 		unsigned long local_dr0_breakpoint : 1;		/* 0 */
34 		unsigned long global_dr0_breakpoint : 1;	/* 1 */
35 		unsigned long local_dr1_breakpoint : 1;		/* 2 */
36 		unsigned long global_dr1_breakpoint : 1;	/* 3 */
37 		unsigned long local_dr2_breakpoint : 1;		/* 4 */
38 		unsigned long global_dr2_breakpoint : 1;	/* 5 */
39 		unsigned long local_dr3_breakpoint : 1;		/* 6 */
40 		unsigned long global_dr3_breakpoint : 1;	/* 7 */
41 		unsigned long local_exact_breakpt : 1;		/* 8 */
42 		unsigned long global_exact_breakpt : 1;		/* 9 */
43 		unsigned long reserved_10 : 1;			/* 10 */
44 		unsigned long rest_trans_memory : 1;		/* 11 */
45 		unsigned long reserved_12 : 1;			/* 12 */
46 		unsigned long general_detect_enable : 1;	/* 13 */
47 		unsigned long reserved_14 : 1;			/* 14 */
48 		unsigned long reserved_15 : 1;			/* 15 */
49 		unsigned long condition_dr0 : 2;		/* 16-17 */
50 		unsigned long len_dr0 : 2;			/* 18-19 */
51 		unsigned long condition_dr1 : 2;		/* 20-21 */
52 		unsigned long len_dr1 : 2;			/* 22-23 */
53 		unsigned long condition_dr2 : 2;		/* 24-25 */
54 		unsigned long len_dr2 : 2;			/* 26-27 */
55 		unsigned long condition_dr3 : 2;		/* 28-29 */
56 		unsigned long len_dr3 : 2;			/* 30-31 */
57 	} bits;
58 };
59 
60 ATF_TC(dbregs_print);
61 ATF_TC_HEAD(dbregs_print, tc)
62 {
63 	atf_tc_set_md_var(tc, "descr",
64 	    "Verify plain PT_GETDBREGS with printing Debug Registers");
65 }
66 
67 ATF_TC_BODY(dbregs_print, tc)
68 {
69 	const int exitval = 5;
70 	const int sigval = SIGSTOP;
71 	pid_t child, wpid;
72 #if defined(TWAIT_HAVE_STATUS)
73 	int status;
74 #endif
75 	struct dbreg r;
76 	size_t i;
77 
78 	DPRINTF("Before forking process PID=%d\n", getpid());
79 	SYSCALL_REQUIRE((child = fork()) != -1);
80 	if (child == 0) {
81 		DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
82 		FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
83 
84 		DPRINTF("Before raising %s from child\n", strsignal(sigval));
85 		FORKEE_ASSERT(raise(sigval) == 0);
86 
87 		DPRINTF("Before exiting of the child process\n");
88 		_exit(exitval);
89 	}
90 	DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
91 
92 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
93 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
94 
95 	validate_status_stopped(status, sigval);
96 
97 	DPRINTF("Call GETDBREGS for the child process\n");
98 	SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r, 0) != -1);
99 
100 	DPRINTF("State of the debug registers:\n");
101 	for (i = 0; i < __arraycount(r.dr); i++)
102 		DPRINTF("r[%zu]=%" PRIxREGISTER "\n", i, r.dr[i]);
103 
104 	DPRINTF("Before resuming the child process where it left off and "
105 	    "without signal to be sent\n");
106 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
107 
108 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
109 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
110 
111 	validate_status_exited(status, exitval);
112 
113 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
114 	TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
115 }
116 
117 
118 enum dbreg_preserve_mode {
119 	dbreg_preserve_mode_none,
120 	dbreg_preserve_mode_yield,
121 	dbreg_preserve_mode_continued
122 };
123 
124 static void
125 dbreg_preserve(int reg, enum dbreg_preserve_mode mode)
126 {
127 	const int exitval = 5;
128 	const int sigval = SIGSTOP;
129 	pid_t child, wpid;
130 #if defined(TWAIT_HAVE_STATUS)
131 	int status;
132 #endif
133 	struct dbreg r1;
134 	struct dbreg r2;
135 	size_t i;
136 	int watchme;
137 
138 	if (!can_we_set_dbregs()) {
139 		atf_tc_skip("Either run this test as root or set sysctl(3) "
140 		            "security.models.extensions.user_set_dbregs to 1");
141 	}
142 
143 	DPRINTF("Before forking process PID=%d\n", getpid());
144 	SYSCALL_REQUIRE((child = fork()) != -1);
145 	if (child == 0) {
146 		DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
147 		FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
148 
149 		DPRINTF("Before raising %s from child\n", strsignal(sigval));
150 		FORKEE_ASSERT(raise(sigval) == 0);
151 
152 		if (mode == dbreg_preserve_mode_continued) {
153 			DPRINTF("Before raising %s from child\n",
154 			       strsignal(sigval));
155 			FORKEE_ASSERT(raise(sigval) == 0);
156 		}
157 
158 		DPRINTF("Before exiting of the child process\n");
159 		_exit(exitval);
160 	}
161 	DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
162 
163 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
164 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
165 
166 	validate_status_stopped(status, sigval);
167 
168 	DPRINTF("Call GETDBREGS for the child process (r1)\n");
169 	SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
170 
171 	DPRINTF("State of the debug registers (r1):\n");
172 	for (i = 0; i < __arraycount(r1.dr); i++)
173 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
174 
175 	r1.dr[reg] = (long)(intptr_t)&watchme;
176 	DPRINTF("Set DR0 (r1.dr[%d]) to new value %" PRIxREGISTER "\n",
177 	    reg, r1.dr[reg]);
178 
179 	DPRINTF("New state of the debug registers (r1):\n");
180 	for (i = 0; i < __arraycount(r1.dr); i++)
181 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
182 
183 	DPRINTF("Call SETDBREGS for the child process (r1)\n");
184 	SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
185 
186 	switch (mode) {
187 	case dbreg_preserve_mode_none:
188 		break;
189 	case dbreg_preserve_mode_yield:
190 		DPRINTF("Yields a processor voluntarily and gives other "
191 		       "threads a chance to run without waiting for an "
192 		       "involuntary preemptive switch\n");
193 		sched_yield();
194 		break;
195 	case dbreg_preserve_mode_continued:
196 		DPRINTF("Call CONTINUE for the child process\n");
197 	        SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
198 
199 		DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
200 		TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
201 
202 		validate_status_stopped(status, sigval);
203 		break;
204 	}
205 
206 	DPRINTF("Call GETDBREGS for the child process (r2)\n");
207 	SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r2, 0) != -1);
208 
209 	DPRINTF("Assert that (r1) and (r2) are the same\n");
210 	SYSCALL_REQUIRE(memcmp(&r1, &r2, sizeof(r1)) == 0);
211 
212 	DPRINTF("Before resuming the child process where it left off and "
213 	    "without signal to be sent\n");
214 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
215 
216 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
217 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
218 
219 	validate_status_exited(status, exitval);
220 
221 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
222 	TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
223 }
224 
225 
226 ATF_TC(dbregs_preserve_dr0);
227 ATF_TC_HEAD(dbregs_preserve_dr0, tc)
228 {
229 	atf_tc_set_md_var(tc, "descr",
230 	    "Verify that setting DR0 is preserved across ptrace(2) calls");
231 }
232 
233 ATF_TC_BODY(dbregs_preserve_dr0, tc)
234 {
235 	dbreg_preserve(0, dbreg_preserve_mode_none);
236 }
237 
238 ATF_TC(dbregs_preserve_dr1);
239 ATF_TC_HEAD(dbregs_preserve_dr1, tc)
240 {
241 	atf_tc_set_md_var(tc, "descr",
242 	    "Verify that setting DR1 is preserved across ptrace(2) calls");
243 }
244 
245 ATF_TC_BODY(dbregs_preserve_dr1, tc)
246 {
247 	dbreg_preserve(1, dbreg_preserve_mode_none);
248 }
249 
250 ATF_TC(dbregs_preserve_dr2);
251 ATF_TC_HEAD(dbregs_preserve_dr2, tc)
252 {
253 	atf_tc_set_md_var(tc, "descr",
254 	    "Verify that setting DR2 is preserved across ptrace(2) calls");
255 }
256 
257 ATF_TC_BODY(dbregs_preserve_dr2, tc)
258 {
259 	dbreg_preserve(2, dbreg_preserve_mode_none);
260 }
261 
262 ATF_TC(dbregs_preserve_dr3);
263 ATF_TC_HEAD(dbregs_preserve_dr3, tc)
264 {
265 	atf_tc_set_md_var(tc, "descr",
266 	    "Verify that setting DR3 is preserved across ptrace(2) calls");
267 }
268 
269 ATF_TC_BODY(dbregs_preserve_dr3, tc)
270 {
271 	dbreg_preserve(3, dbreg_preserve_mode_none);
272 }
273 
274 ATF_TC(dbregs_preserve_dr0_yield);
275 ATF_TC_HEAD(dbregs_preserve_dr0_yield, tc)
276 {
277 	atf_tc_set_md_var(tc, "descr",
278 	    "Verify that setting DR0 is preserved across ptrace(2) calls with "
279 	    "scheduler yield");
280 }
281 
282 ATF_TC_BODY(dbregs_preserve_dr0_yield, tc)
283 {
284 	dbreg_preserve(0, dbreg_preserve_mode_yield);
285 }
286 
287 ATF_TC(dbregs_preserve_dr1_yield);
288 ATF_TC_HEAD(dbregs_preserve_dr1_yield, tc)
289 {
290 	atf_tc_set_md_var(tc, "descr",
291 	    "Verify that setting DR1 is preserved across ptrace(2) calls with "
292 	    "scheduler yield");
293 }
294 
295 ATF_TC_BODY(dbregs_preserve_dr1_yield, tc)
296 {
297 	dbreg_preserve(0, dbreg_preserve_mode_yield);
298 }
299 
300 ATF_TC(dbregs_preserve_dr2_yield);
301 ATF_TC_HEAD(dbregs_preserve_dr2_yield, tc)
302 {
303 	atf_tc_set_md_var(tc, "descr",
304 	    "Verify that setting DR2 is preserved across ptrace(2) calls with "
305 	    "scheduler yield");
306 }
307 
308 ATF_TC_BODY(dbregs_preserve_dr2_yield, tc)
309 {
310 	dbreg_preserve(0, dbreg_preserve_mode_yield);
311 }
312 
313 
314 ATF_TC(dbregs_preserve_dr3_yield);
315 ATF_TC_HEAD(dbregs_preserve_dr3_yield, tc)
316 {
317 	atf_tc_set_md_var(tc, "descr",
318 	    "Verify that setting DR3 is preserved across ptrace(2) calls with "
319 	    "scheduler yield");
320 }
321 
322 ATF_TC_BODY(dbregs_preserve_dr3_yield, tc)
323 {
324 	dbreg_preserve(3, dbreg_preserve_mode_yield);
325 }
326 
327 ATF_TC(dbregs_preserve_dr0_continued);
328 ATF_TC_HEAD(dbregs_preserve_dr0_continued, tc)
329 {
330 	atf_tc_set_md_var(tc, "descr",
331 	    "Verify that setting DR0 is preserved across ptrace(2) calls and "
332 	    "with continued child");
333 }
334 
335 ATF_TC_BODY(dbregs_preserve_dr0_continued, tc)
336 {
337 	dbreg_preserve(0, dbreg_preserve_mode_continued);
338 }
339 
340 ATF_TC(dbregs_preserve_dr1_continued);
341 ATF_TC_HEAD(dbregs_preserve_dr1_continued, tc)
342 {
343 	atf_tc_set_md_var(tc, "descr",
344 	    "Verify that setting DR1 is preserved across ptrace(2) calls and "
345 	    "with continued child");
346 }
347 
348 ATF_TC_BODY(dbregs_preserve_dr1_continued, tc)
349 {
350 	dbreg_preserve(1, dbreg_preserve_mode_continued);
351 }
352 
353 ATF_TC(dbregs_preserve_dr2_continued);
354 ATF_TC_HEAD(dbregs_preserve_dr2_continued, tc)
355 {
356 	atf_tc_set_md_var(tc, "descr",
357 	    "Verify that setting DR2 is preserved across ptrace(2) calls and "
358 	    "with continued child");
359 }
360 
361 ATF_TC_BODY(dbregs_preserve_dr2_continued, tc)
362 {
363 	dbreg_preserve(2, dbreg_preserve_mode_continued);
364 }
365 
366 ATF_TC(dbregs_preserve_dr3_continued);
367 ATF_TC_HEAD(dbregs_preserve_dr3_continued, tc)
368 {
369 	atf_tc_set_md_var(tc, "descr",
370 	    "Verify that setting DR3 is preserved across ptrace(2) calls and "
371 	    "with continued child");
372 }
373 
374 ATF_TC_BODY(dbregs_preserve_dr3_continued, tc)
375 {
376 	dbreg_preserve(3, dbreg_preserve_mode_continued);
377 }
378 
379 
380 static void
381 dbregs_trap_variable(int reg, int cond, int len, bool write)
382 {
383 	const int exitval = 5;
384 	const int sigval = SIGSTOP;
385 	pid_t child, wpid;
386 #if defined(TWAIT_HAVE_STATUS)
387 	int status;
388 #endif
389 	struct dbreg r1;
390 	size_t i;
391 	volatile int watchme = 0;
392 	union u dr7;
393 
394 	struct ptrace_siginfo info;
395 	memset(&info, 0, sizeof(info));
396 
397 	if (!can_we_set_dbregs()) {
398 		atf_tc_skip("Either run this test as root or set sysctl(3) "
399 		            "security.models.extensions.user_set_dbregs to 1");
400 	}
401 
402 	dr7.raw = 0;
403 	switch (reg) {
404 	case 0:
405 		dr7.bits.global_dr0_breakpoint = 1;
406 		dr7.bits.condition_dr0 = cond;
407 		dr7.bits.len_dr0 = len;
408 		break;
409 	case 1:
410 		dr7.bits.global_dr1_breakpoint = 1;
411 		dr7.bits.condition_dr1 = cond;
412 		dr7.bits.len_dr1 = len;
413 		break;
414 	case 2:
415 		dr7.bits.global_dr2_breakpoint = 1;
416 		dr7.bits.condition_dr2 = cond;
417 		dr7.bits.len_dr2 = len;
418 		break;
419 	case 3:
420 		dr7.bits.global_dr3_breakpoint = 1;
421 		dr7.bits.condition_dr3 = cond;
422 		dr7.bits.len_dr3 = len;
423 		break;
424 	}
425 
426 	DPRINTF("Before forking process PID=%d\n", getpid());
427 	SYSCALL_REQUIRE((child = fork()) != -1);
428 	if (child == 0) {
429 		DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
430 		FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
431 
432 		DPRINTF("Before raising %s from child\n", strsignal(sigval));
433 		FORKEE_ASSERT(raise(sigval) == 0);
434 
435 		if (write)
436 			watchme = 1;
437 		else
438 			printf("watchme=%d\n", watchme);
439 
440 		DPRINTF("Before raising %s from child\n", strsignal(sigval));
441 		FORKEE_ASSERT(raise(sigval) == 0);
442 
443 		DPRINTF("Before exiting of the child process\n");
444 		_exit(exitval);
445 	}
446 	DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
447 
448 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
449 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
450 
451 	validate_status_stopped(status, sigval);
452 
453 	DPRINTF("Call GETDBREGS for the child process (r1)\n");
454 	SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
455 
456 	DPRINTF("State of the debug registers (r1):\n");
457 	for (i = 0; i < __arraycount(r1.dr); i++)
458 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
459 
460 	r1.dr[reg] = (long)(intptr_t)&watchme;
461 	DPRINTF("Set DR%d (r1.dr[%d]) to new value %" PRIxREGISTER "\n",
462 	    reg, reg, r1.dr[reg]);
463 
464 	r1.dr[7] = dr7.raw;
465 	DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
466 	    r1.dr[7]);
467 
468 	DPRINTF("New state of the debug registers (r1):\n");
469 	for (i = 0; i < __arraycount(r1.dr); i++)
470 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
471 
472 	DPRINTF("Call SETDBREGS for the child process (r1)\n");
473 	SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
474 
475 	DPRINTF("Call CONTINUE for the child process\n");
476 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
477 
478 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
479 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
480 
481 	validate_status_stopped(status, SIGTRAP);
482 
483 	DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
484 	SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
485 
486 	DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
487 	DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
488 	    info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
489 	    info.psi_siginfo.si_errno);
490 
491 	DPRINTF("Before checking siginfo_t\n");
492 	ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, SIGTRAP);
493 	ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_DBREG);
494 
495 	DPRINTF("Call CONTINUE for the child process\n");
496 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
497 
498 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
499 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
500 
501 	validate_status_stopped(status, sigval);
502 
503 	DPRINTF("Before resuming the child process where it left off and "
504 	    "without signal to be sent\n");
505 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
506 
507 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
508 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
509 
510 	validate_status_exited(status, exitval);
511 
512 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
513 	TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
514 }
515 
516 ATF_TC(dbregs_dr0_trap_variable_writeonly_byte);
517 ATF_TC_HEAD(dbregs_dr0_trap_variable_writeonly_byte, tc)
518 {
519 	atf_tc_set_md_var(tc, "descr",
520 	    "Verify that setting trap with DR0 triggers SIGTRAP "
521 	    "(break on data writes only and 1 byte mode)");
522 }
523 
524 ATF_TC_BODY(dbregs_dr0_trap_variable_writeonly_byte, tc)
525 {
526 	/* 0b01 -- break on data write only */
527 	/* 0b00 -- 1 byte */
528 
529 	dbregs_trap_variable(0, 1, 0, true);
530 }
531 
532 ATF_TC(dbregs_dr1_trap_variable_writeonly_byte);
533 ATF_TC_HEAD(dbregs_dr1_trap_variable_writeonly_byte, tc)
534 {
535 	atf_tc_set_md_var(tc, "descr",
536 	    "Verify that setting trap with DR1 triggers SIGTRAP "
537 	    "(break on data writes only and 1 byte mode)");
538 }
539 
540 ATF_TC_BODY(dbregs_dr1_trap_variable_writeonly_byte, tc)
541 {
542 	/* 0b01 -- break on data write only */
543 	/* 0b00 -- 1 byte */
544 
545 	dbregs_trap_variable(1, 1, 0, true);
546 }
547 
548 ATF_TC(dbregs_dr2_trap_variable_writeonly_byte);
549 ATF_TC_HEAD(dbregs_dr2_trap_variable_writeonly_byte, tc)
550 {
551 	atf_tc_set_md_var(tc, "descr",
552 	    "Verify that setting trap with DR2 triggers SIGTRAP "
553 	    "(break on data writes only and 1 byte mode)");
554 }
555 
556 ATF_TC_BODY(dbregs_dr2_trap_variable_writeonly_byte, tc)
557 {
558 	/* 0b01 -- break on data write only */
559 	/* 0b00 -- 1 byte */
560 
561 	dbregs_trap_variable(2, 1, 0, true);
562 }
563 
564 ATF_TC(dbregs_dr3_trap_variable_writeonly_byte);
565 ATF_TC_HEAD(dbregs_dr3_trap_variable_writeonly_byte, tc)
566 {
567 	atf_tc_set_md_var(tc, "descr",
568 	    "Verify that setting trap with DR3 triggers SIGTRAP "
569 	    "(break on data writes only and 1 byte mode)");
570 }
571 
572 ATF_TC_BODY(dbregs_dr3_trap_variable_writeonly_byte, tc)
573 {
574 	/* 0b01 -- break on data write only */
575 	/* 0b00 -- 1 byte */
576 
577 	dbregs_trap_variable(3, 1, 0, true);
578 }
579 
580 ATF_TC(dbregs_dr0_trap_variable_writeonly_2bytes);
581 ATF_TC_HEAD(dbregs_dr0_trap_variable_writeonly_2bytes, tc)
582 {
583 	atf_tc_set_md_var(tc, "descr",
584 	    "Verify that setting trap with DR0 triggers SIGTRAP "
585 	    "(break on data writes only and 2 bytes mode)");
586 }
587 
588 ATF_TC_BODY(dbregs_dr0_trap_variable_writeonly_2bytes, tc)
589 {
590 	/* 0b01 -- break on data write only */
591 	/* 0b01 -- 2 bytes */
592 
593 	dbregs_trap_variable(0, 1, 1, true);
594 }
595 
596 ATF_TC(dbregs_dr1_trap_variable_writeonly_2bytes);
597 ATF_TC_HEAD(dbregs_dr1_trap_variable_writeonly_2bytes, tc)
598 {
599 	atf_tc_set_md_var(tc, "descr",
600 	    "Verify that setting trap with DR1 triggers SIGTRAP "
601 	    "(break on data writes only and 2 bytes mode)");
602 }
603 
604 ATF_TC_BODY(dbregs_dr1_trap_variable_writeonly_2bytes, tc)
605 {
606 	/* 0b01 -- break on data write only */
607 	/* 0b01 -- 2 bytes */
608 
609 	dbregs_trap_variable(1, 1, 1, true);
610 }
611 
612 ATF_TC(dbregs_dr2_trap_variable_writeonly_2bytes);
613 ATF_TC_HEAD(dbregs_dr2_trap_variable_writeonly_2bytes, tc)
614 {
615 	atf_tc_set_md_var(tc, "descr",
616 	    "Verify that setting trap with DR2 triggers SIGTRAP "
617 	    "(break on data writes only and 2 bytes mode)");
618 }
619 
620 ATF_TC_BODY(dbregs_dr2_trap_variable_writeonly_2bytes, tc)
621 {
622 	/* 0b01 -- break on data write only */
623 	/* 0b01 -- 2 bytes */
624 
625 	dbregs_trap_variable(2, 1, 1, true);
626 }
627 
628 ATF_TC(dbregs_dr3_trap_variable_writeonly_2bytes);
629 ATF_TC_HEAD(dbregs_dr3_trap_variable_writeonly_2bytes, tc)
630 {
631 	atf_tc_set_md_var(tc, "descr",
632 	    "Verify that setting trap with DR3 triggers SIGTRAP "
633 	    "(break on data writes only and 2 bytes mode)");
634 }
635 
636 ATF_TC_BODY(dbregs_dr3_trap_variable_writeonly_2bytes, tc)
637 {
638 	/* 0b01 -- break on data write only */
639 	/* 0b01 -- 2 bytes */
640 
641 	dbregs_trap_variable(3, 1, 1, true);
642 }
643 
644 ATF_TC(dbregs_dr0_trap_variable_writeonly_4bytes);
645 ATF_TC_HEAD(dbregs_dr0_trap_variable_writeonly_4bytes, tc)
646 {
647 	atf_tc_set_md_var(tc, "descr",
648 	    "Verify that setting trap with DR0 triggers SIGTRAP "
649 	    "(break on data writes only and 4 bytes mode)");
650 }
651 
652 ATF_TC_BODY(dbregs_dr0_trap_variable_writeonly_4bytes, tc)
653 {
654 	/* 0b01 -- break on data write only */
655 	/* 0b11 -- 4 bytes */
656 
657 	dbregs_trap_variable(0, 1, 3, true);
658 }
659 
660 ATF_TC(dbregs_dr1_trap_variable_writeonly_4bytes);
661 ATF_TC_HEAD(dbregs_dr1_trap_variable_writeonly_4bytes, tc)
662 {
663 	atf_tc_set_md_var(tc, "descr",
664 	    "Verify that setting trap with DR1 triggers SIGTRAP "
665 	    "(break on data writes only and 4 bytes mode)");
666 }
667 
668 ATF_TC_BODY(dbregs_dr1_trap_variable_writeonly_4bytes, tc)
669 {
670 	/* 0b01 -- break on data write only */
671 	/* 0b11 -- 4 bytes */
672 
673 	dbregs_trap_variable(1, 1, 3, true);
674 }
675 
676 ATF_TC(dbregs_dr2_trap_variable_writeonly_4bytes);
677 ATF_TC_HEAD(dbregs_dr2_trap_variable_writeonly_4bytes, tc)
678 {
679 	atf_tc_set_md_var(tc, "descr",
680 	    "Verify that setting trap with DR2 triggers SIGTRAP "
681 	    "(break on data writes only and 4 bytes mode)");
682 }
683 
684 ATF_TC_BODY(dbregs_dr2_trap_variable_writeonly_4bytes, tc)
685 {
686 	/* 0b01 -- break on data write only */
687 	/* 0b11 -- 4 bytes */
688 
689 	dbregs_trap_variable(2, 1, 3, true);
690 }
691 
692 ATF_TC(dbregs_dr3_trap_variable_writeonly_4bytes);
693 ATF_TC_HEAD(dbregs_dr3_trap_variable_writeonly_4bytes, tc)
694 {
695 	atf_tc_set_md_var(tc, "descr",
696 	    "Verify that setting trap with DR3 triggers SIGTRAP "
697 	    "(break on data writes only and 4 bytes mode)");
698 }
699 
700 ATF_TC_BODY(dbregs_dr3_trap_variable_writeonly_4bytes, tc)
701 {
702 	/* 0b01 -- break on data write only */
703 	/* 0b11 -- 4 bytes */
704 
705 	dbregs_trap_variable(3, 1, 3, true);
706 }
707 
708 ATF_TC(dbregs_dr0_trap_variable_readwrite_write_byte);
709 ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_write_byte, tc)
710 {
711 	atf_tc_set_md_var(tc, "descr",
712 	    "Verify that setting trap with DR0 triggers SIGTRAP "
713 	    "(break on data read/write trap in read 1 byte mode)");
714 }
715 
716 ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_write_byte, tc)
717 {
718 	/* 0b11 -- break on data write&read */
719 	/* 0b00 -- 1 byte */
720 
721 	dbregs_trap_variable(0, 3, 0, true);
722 }
723 
724 ATF_TC(dbregs_dr1_trap_variable_readwrite_write_byte);
725 ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_write_byte, tc)
726 {
727 	atf_tc_set_md_var(tc, "descr",
728 	    "Verify that setting trap with DR1 triggers SIGTRAP "
729 	    "(break on data read/write trap in read 1 byte mode)");
730 }
731 
732 ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_write_byte, tc)
733 {
734 	/* 0b11 -- break on data write&read */
735 	/* 0b00 -- 1 byte */
736 
737 	dbregs_trap_variable(1, 3, 0, true);
738 }
739 
740 ATF_TC(dbregs_dr2_trap_variable_readwrite_write_byte);
741 ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_write_byte, tc)
742 {
743 	atf_tc_set_md_var(tc, "descr",
744 	    "Verify that setting trap with DR2 triggers SIGTRAP "
745 	    "(break on data read/write trap in read 1 byte mode)");
746 }
747 
748 ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_write_byte, tc)
749 {
750 	/* 0b11 -- break on data write&read */
751 	/* 0b00 -- 1 byte */
752 
753 	dbregs_trap_variable(2, 3, 0, true);
754 }
755 
756 ATF_TC(dbregs_dr3_trap_variable_readwrite_write_byte);
757 ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_write_byte, tc)
758 {
759 	atf_tc_set_md_var(tc, "descr",
760 	    "Verify that setting trap with DR3 triggers SIGTRAP "
761 	    "(break on data read/write trap in read 1 byte mode)");
762 }
763 
764 ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_write_byte, tc)
765 {
766 	/* 0b11 -- break on data write&read */
767 	/* 0b00 -- 1 byte */
768 
769 	dbregs_trap_variable(3, 3, 0, true);
770 }
771 
772 ATF_TC(dbregs_dr0_trap_variable_readwrite_write_2bytes);
773 ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_write_2bytes, tc)
774 {
775 	atf_tc_set_md_var(tc, "descr",
776 	    "Verify that setting trap with DR0 triggers SIGTRAP "
777 	    "(break on data read/write trap in read 2 bytes mode)");
778 }
779 
780 ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_write_2bytes, tc)
781 {
782 	/* 0b11 -- break on data write&read */
783 	/* 0b01 -- 2 bytes */
784 
785 	dbregs_trap_variable(0, 3, 1, true);
786 }
787 
788 ATF_TC(dbregs_dr1_trap_variable_readwrite_write_2bytes);
789 ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_write_2bytes, tc)
790 {
791 	atf_tc_set_md_var(tc, "descr",
792 	    "Verify that setting trap with DR1 triggers SIGTRAP "
793 	    "(break on data read/write trap in read 2 bytes mode)");
794 }
795 
796 ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_write_2bytes, tc)
797 {
798 	/* 0b11 -- break on data write&read */
799 	/* 0b01 -- 2 bytes */
800 
801 	dbregs_trap_variable(1, 3, 1, true);
802 }
803 
804 ATF_TC(dbregs_dr2_trap_variable_readwrite_write_2bytes);
805 ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_write_2bytes, tc)
806 {
807 	atf_tc_set_md_var(tc, "descr",
808 	    "Verify that setting trap with DR2 triggers SIGTRAP "
809 	    "(break on data read/write trap in read 2 bytes mode)");
810 }
811 
812 ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_write_2bytes, tc)
813 {
814 	/* 0b11 -- break on data write&read */
815 	/* 0b01 -- 2 bytes */
816 
817 	dbregs_trap_variable(2, 3, 1, true);
818 }
819 
820 ATF_TC(dbregs_dr3_trap_variable_readwrite_write_2bytes);
821 ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_write_2bytes, tc)
822 {
823 	atf_tc_set_md_var(tc, "descr",
824 	    "Verify that setting trap with DR3 triggers SIGTRAP "
825 	    "(break on data read/write trap in read 2 bytes mode)");
826 }
827 
828 ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_write_2bytes, tc)
829 {
830 	/* 0b11 -- break on data write&read */
831 	/* 0b01 -- 2 bytes */
832 
833 	dbregs_trap_variable(3, 3, 1, true);
834 }
835 
836 ATF_TC(dbregs_dr0_trap_variable_readwrite_write_4bytes);
837 ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_write_4bytes, tc)
838 {
839 	atf_tc_set_md_var(tc, "descr",
840 	    "Verify that setting trap with DR0 triggers SIGTRAP "
841 	    "(break on data read/write trap in read 4 bytes mode)");
842 }
843 
844 ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_write_4bytes, tc)
845 {
846 	/* 0b11 -- break on data write&read */
847 	/* 0b11 -- 4 bytes */
848 
849 	dbregs_trap_variable(0, 3, 3, true);
850 }
851 
852 ATF_TC(dbregs_dr1_trap_variable_readwrite_write_4bytes);
853 ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_write_4bytes, tc)
854 {
855 	atf_tc_set_md_var(tc, "descr",
856 	    "Verify that setting trap with DR1 triggers SIGTRAP "
857 	    "(break on data read/write trap in read 4 bytes mode)");
858 }
859 
860 ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_write_4bytes, tc)
861 {
862 	/* 0b11 -- break on data write&read */
863 	/* 0b11 -- 4 bytes */
864 
865 	dbregs_trap_variable(1, 3, 3, true);
866 }
867 
868 ATF_TC(dbregs_dr2_trap_variable_readwrite_write_4bytes);
869 ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_write_4bytes, tc)
870 {
871 	atf_tc_set_md_var(tc, "descr",
872 	    "Verify that setting trap with DR2 triggers SIGTRAP "
873 	    "(break on data read/write trap in read 4 bytes mode)");
874 }
875 
876 ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_write_4bytes, tc)
877 {
878 	/* 0b11 -- break on data write&read */
879 	/* 0b11 -- 4 bytes */
880 
881 	dbregs_trap_variable(2, 3, 3, true);
882 }
883 
884 ATF_TC(dbregs_dr3_trap_variable_readwrite_write_4bytes);
885 ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_write_4bytes, tc)
886 {
887 	atf_tc_set_md_var(tc, "descr",
888 	    "Verify that setting trap with DR3 triggers SIGTRAP "
889 	    "(break on data read/write trap in read 4 bytes mode)");
890 }
891 
892 ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_write_4bytes, tc)
893 {
894 	/* 0b11 -- break on data write&read */
895 	/* 0b11 -- 4 bytes */
896 
897 	dbregs_trap_variable(3, 3, 3, true);
898 }
899 
900 ATF_TC(dbregs_dr0_trap_variable_readwrite_read_byte);
901 ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_read_byte, tc)
902 {
903 	atf_tc_set_md_var(tc, "descr",
904 	    "Verify that setting trap with DR0 triggers SIGTRAP "
905 	    "(break on data read/write trap in write 1 byte mode)");
906 }
907 
908 ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_read_byte, tc)
909 {
910 	/* 0b11 -- break on data write&read */
911 	/* 0b00 -- 1 byte */
912 
913 	dbregs_trap_variable(0, 3, 0, false);
914 }
915 
916 ATF_TC(dbregs_dr1_trap_variable_readwrite_read_byte);
917 ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_read_byte, tc)
918 {
919 	atf_tc_set_md_var(tc, "descr",
920 	    "Verify that setting trap with DR1 triggers SIGTRAP "
921 	    "(break on data read/write trap in write 1 byte mode)");
922 }
923 
924 ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_read_byte, tc)
925 {
926 	/* 0b11 -- break on data write&read */
927 	/* 0b00 -- 1 byte */
928 
929 	dbregs_trap_variable(1, 3, 0, false);
930 }
931 
932 ATF_TC(dbregs_dr2_trap_variable_readwrite_read_byte);
933 ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_read_byte, tc)
934 {
935 	atf_tc_set_md_var(tc, "descr",
936 	    "Verify that setting trap with DR2 triggers SIGTRAP "
937 	    "(break on data read/write trap in write 1 byte mode)");
938 }
939 
940 ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_read_byte, tc)
941 {
942 	/* 0b11 -- break on data write&read */
943 	/* 0b00 -- 1 byte */
944 
945 	dbregs_trap_variable(2, 3, 0, false);
946 }
947 
948 ATF_TC(dbregs_dr3_trap_variable_readwrite_read_byte);
949 ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_read_byte, tc)
950 {
951 	atf_tc_set_md_var(tc, "descr",
952 	    "Verify that setting trap with DR3 triggers SIGTRAP "
953 	    "(break on data read/write trap in write 1 byte mode)");
954 }
955 
956 ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_read_byte, tc)
957 {
958 	/* 0b11 -- break on data write&read */
959 	/* 0b00 -- 1 byte */
960 
961 	dbregs_trap_variable(3, 3, 0, false);
962 }
963 
964 ATF_TC(dbregs_dr0_trap_variable_readwrite_read_2bytes);
965 ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_read_2bytes, tc)
966 {
967 	atf_tc_set_md_var(tc, "descr",
968 	    "Verify that setting trap with DR0 triggers SIGTRAP "
969 	    "(break on data read/write trap in write 2 bytes mode)");
970 }
971 
972 ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_read_2bytes, tc)
973 {
974 	/* 0b11 -- break on data write&read */
975 	/* 0b01 -- 2 bytes */
976 
977 	dbregs_trap_variable(0, 3, 1, false);
978 }
979 
980 ATF_TC(dbregs_dr1_trap_variable_readwrite_read_2bytes);
981 ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_read_2bytes, tc)
982 {
983 	atf_tc_set_md_var(tc, "descr",
984 	    "Verify that setting trap with DR1 triggers SIGTRAP "
985 	    "(break on data read/write trap in write 2 bytes mode)");
986 }
987 
988 ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_read_2bytes, tc)
989 {
990 	/* 0b11 -- break on data write&read */
991 	/* 0b01 -- 2 bytes */
992 
993 	dbregs_trap_variable(1, 3, 1, false);
994 }
995 
996 ATF_TC(dbregs_dr2_trap_variable_readwrite_read_2bytes);
997 ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_read_2bytes, tc)
998 {
999 	atf_tc_set_md_var(tc, "descr",
1000 	    "Verify that setting trap with DR2 triggers SIGTRAP "
1001 	    "(break on data read/write trap in write 2 bytes mode)");
1002 }
1003 
1004 ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_read_2bytes, tc)
1005 {
1006 	/* 0b11 -- break on data write&read */
1007 	/* 0b01 -- 2 bytes */
1008 
1009 	dbregs_trap_variable(2, 3, 1, false);
1010 }
1011 
1012 ATF_TC(dbregs_dr3_trap_variable_readwrite_read_2bytes);
1013 ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_read_2bytes, tc)
1014 {
1015 	atf_tc_set_md_var(tc, "descr",
1016 	    "Verify that setting trap with DR3 triggers SIGTRAP "
1017 	    "(break on data read/write trap in write 2 bytes mode)");
1018 }
1019 
1020 ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_read_2bytes, tc)
1021 {
1022 	/* 0b11 -- break on data write&read */
1023 	/* 0b01 -- 2 bytes */
1024 
1025 	dbregs_trap_variable(3, 3, 1, false);
1026 }
1027 
1028 ATF_TC(dbregs_dr0_trap_variable_readwrite_read_4bytes);
1029 ATF_TC_HEAD(dbregs_dr0_trap_variable_readwrite_read_4bytes, tc)
1030 {
1031 	atf_tc_set_md_var(tc, "descr",
1032 	    "Verify that setting trap with DR0 triggers SIGTRAP "
1033 	    "(break on data read/write trap in write 4 bytes mode)");
1034 }
1035 
1036 ATF_TC_BODY(dbregs_dr0_trap_variable_readwrite_read_4bytes, tc)
1037 {
1038 	/* 0b11 -- break on data write&read */
1039 	/* 0b11 -- 4 bytes */
1040 
1041 	dbregs_trap_variable(0, 3, 3, false);
1042 }
1043 
1044 ATF_TC(dbregs_dr1_trap_variable_readwrite_read_4bytes);
1045 ATF_TC_HEAD(dbregs_dr1_trap_variable_readwrite_read_4bytes, tc)
1046 {
1047 	atf_tc_set_md_var(tc, "descr",
1048 	    "Verify that setting trap with DR1 triggers SIGTRAP "
1049 	    "(break on data read/write trap in write 4 bytes mode)");
1050 }
1051 
1052 ATF_TC_BODY(dbregs_dr1_trap_variable_readwrite_read_4bytes, tc)
1053 {
1054 	/* 0b11 -- break on data write&read */
1055 	/* 0b11 -- 4 bytes */
1056 
1057 	dbregs_trap_variable(1, 3, 3, false);
1058 }
1059 
1060 ATF_TC(dbregs_dr2_trap_variable_readwrite_read_4bytes);
1061 ATF_TC_HEAD(dbregs_dr2_trap_variable_readwrite_read_4bytes, tc)
1062 {
1063 	atf_tc_set_md_var(tc, "descr",
1064 	    "Verify that setting trap with DR2 triggers SIGTRAP "
1065 	    "(break on data read/write trap in write 4 bytes mode)");
1066 }
1067 
1068 ATF_TC_BODY(dbregs_dr2_trap_variable_readwrite_read_4bytes, tc)
1069 {
1070 	/* 0b11 -- break on data write&read */
1071 	/* 0b11 -- 4 bytes */
1072 
1073 	dbregs_trap_variable(2, 3, 3, false);
1074 }
1075 
1076 ATF_TC(dbregs_dr3_trap_variable_readwrite_read_4bytes);
1077 ATF_TC_HEAD(dbregs_dr3_trap_variable_readwrite_read_4bytes, tc)
1078 {
1079 	atf_tc_set_md_var(tc, "descr",
1080 	    "Verify that setting trap with DR3 triggers SIGTRAP "
1081 	    "(break on data read/write trap in write 4 bytes mode)");
1082 }
1083 
1084 ATF_TC_BODY(dbregs_dr3_trap_variable_readwrite_read_4bytes, tc)
1085 {
1086 	/* 0b11 -- break on data write&read */
1087 	/* 0b11 -- 4 bytes */
1088 
1089 	dbregs_trap_variable(3, 3, 3, false);
1090 }
1091 
1092 #if defined(HAVE_DBREGS)
1093 ATF_TC(dbregs_dr0_trap_code);
1094 ATF_TC_HEAD(dbregs_dr0_trap_code, tc)
1095 {
1096 	atf_tc_set_md_var(tc, "descr",
1097 	    "Verify that setting trap with DR0 triggers SIGTRAP "
1098 	    "(break on code execution trap)");
1099 }
1100 
1101 ATF_TC_BODY(dbregs_dr0_trap_code, tc)
1102 {
1103 	const int exitval = 5;
1104 	const int sigval = SIGSTOP;
1105 	pid_t child, wpid;
1106 #if defined(TWAIT_HAVE_STATUS)
1107 	int status;
1108 #endif
1109 	struct dbreg r1;
1110 	size_t i;
1111 	volatile int watchme = 1;
1112 	union u dr7;
1113 
1114 	struct ptrace_siginfo info;
1115 	memset(&info, 0, sizeof(info));
1116 
1117 	if (!can_we_set_dbregs()) {
1118 		atf_tc_skip("Either run this test as root or set sysctl(3) "
1119 		            "security.models.extensions.user_set_dbregs to 1");
1120 	}
1121 
1122 	dr7.raw = 0;
1123 	dr7.bits.global_dr0_breakpoint = 1;
1124 	dr7.bits.condition_dr0 = 0;	/* 0b00 -- break on code execution */
1125 	dr7.bits.len_dr0 = 0;		/* 0b00 -- 1 byte */
1126 
1127 	DPRINTF("Before forking process PID=%d\n", getpid());
1128 	SYSCALL_REQUIRE((child = fork()) != -1);
1129 	if (child == 0) {
1130 		DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1131 		FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1132 
1133 		DPRINTF("Before raising %s from child\n", strsignal(sigval));
1134 		FORKEE_ASSERT(raise(sigval) == 0);
1135 
1136 		printf("check_happy(%d)=%d\n", watchme, check_happy(watchme));
1137 
1138 		DPRINTF("Before raising %s from child\n", strsignal(sigval));
1139 		FORKEE_ASSERT(raise(sigval) == 0);
1140 
1141 		DPRINTF("Before exiting of the child process\n");
1142 		_exit(exitval);
1143 	}
1144 	DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1145 
1146 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1147 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1148 
1149 	validate_status_stopped(status, sigval);
1150 
1151 	DPRINTF("Call GETDBREGS for the child process (r1)\n");
1152 	SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1153 
1154 	DPRINTF("State of the debug registers (r1):\n");
1155 	for (i = 0; i < __arraycount(r1.dr); i++)
1156 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1157 
1158 	r1.dr[0] = (long)(intptr_t)check_happy;
1159 	DPRINTF("Set DR0 (r1.dr[0]) to new value %" PRIxREGISTER "\n",
1160 	    r1.dr[0]);
1161 
1162 	r1.dr[7] = dr7.raw;
1163 	DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1164 	    r1.dr[7]);
1165 
1166 	DPRINTF("New state of the debug registers (r1):\n");
1167 	for (i = 0; i < __arraycount(r1.dr); i++)
1168 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1169 
1170 	DPRINTF("Call SETDBREGS for the child process (r1)\n");
1171 	SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1172 
1173 	DPRINTF("Call CONTINUE for the child process\n");
1174 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1175 
1176 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1177 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1178 
1179 	validate_status_stopped(status, SIGTRAP);
1180 
1181 	DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
1182 	SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
1183 
1184 	DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
1185 	DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
1186 	    info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
1187 	    info.psi_siginfo.si_errno);
1188 
1189 	DPRINTF("Before checking siginfo_t\n");
1190 	ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, SIGTRAP);
1191 	ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_DBREG);
1192 
1193 	DPRINTF("Remove code trap from check_happy=%p\n", check_happy);
1194 	dr7.bits.global_dr0_breakpoint = 0;
1195 	r1.dr[7] = dr7.raw;
1196 	DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1197 	    r1.dr[7]);
1198 
1199 	DPRINTF("Call SETDBREGS for the child process (r1)\n");
1200 	SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1201 
1202 	DPRINTF("Call CONTINUE for the child process\n");
1203 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1204 
1205 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1206 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1207 
1208 	validate_status_stopped(status, sigval);
1209 
1210 	DPRINTF("Before resuming the child process where it left off and "
1211 	    "without signal to be sent\n");
1212 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1213 
1214 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1215 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1216 
1217 	validate_status_exited(status, exitval);
1218 
1219 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1220 	TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1221 }
1222 #endif
1223 
1224 #if defined(HAVE_DBREGS)
1225 ATF_TC(dbregs_dr1_trap_code);
1226 ATF_TC_HEAD(dbregs_dr1_trap_code, tc)
1227 {
1228 	atf_tc_set_md_var(tc, "descr",
1229 	    "Verify that setting trap with DR1 triggers SIGTRAP "
1230 	    "(break on code execution trap)");
1231 }
1232 
1233 ATF_TC_BODY(dbregs_dr1_trap_code, tc)
1234 {
1235 	const int exitval = 5;
1236 	const int sigval = SIGSTOP;
1237 	pid_t child, wpid;
1238 #if defined(TWAIT_HAVE_STATUS)
1239 	int status;
1240 #endif
1241 	struct dbreg r1;
1242 	size_t i;
1243 	volatile int watchme = 1;
1244 	union u dr7;
1245 
1246 	struct ptrace_siginfo info;
1247 	memset(&info, 0, sizeof(info));
1248 
1249 	if (!can_we_set_dbregs()) {
1250 		atf_tc_skip("Either run this test as root or set sysctl(3) "
1251 		            "security.models.extensions.user_set_dbregs to 1");
1252 	}
1253 
1254 	dr7.raw = 0;
1255 	dr7.bits.global_dr1_breakpoint = 1;
1256 	dr7.bits.condition_dr1 = 0;	/* 0b00 -- break on code execution */
1257 	dr7.bits.len_dr1 = 0;		/* 0b00 -- 1 byte */
1258 
1259 	DPRINTF("Before forking process PID=%d\n", getpid());
1260 	SYSCALL_REQUIRE((child = fork()) != -1);
1261 	if (child == 0) {
1262 		DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1263 		FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1264 
1265 		DPRINTF("Before raising %s from child\n", strsignal(sigval));
1266 		FORKEE_ASSERT(raise(sigval) == 0);
1267 
1268 		printf("check_happy(%d)=%d\n", watchme, check_happy(watchme));
1269 
1270 		DPRINTF("Before raising %s from child\n", strsignal(sigval));
1271 		FORKEE_ASSERT(raise(sigval) == 0);
1272 
1273 		DPRINTF("Before exiting of the child process\n");
1274 		_exit(exitval);
1275 	}
1276 	DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1277 
1278 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1279 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1280 
1281 	validate_status_stopped(status, sigval);
1282 
1283 	DPRINTF("Call GETDBREGS for the child process (r1)\n");
1284 	SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1285 
1286 	DPRINTF("State of the debug registers (r1):\n");
1287 	for (i = 0; i < __arraycount(r1.dr); i++)
1288 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1289 
1290 	r1.dr[1] = (long)(intptr_t)check_happy;
1291 	DPRINTF("Set DR1 (r1.dr[1]) to new value %" PRIxREGISTER "\n",
1292 	    r1.dr[1]);
1293 
1294 	r1.dr[7] = dr7.raw;
1295 	DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1296 	    r1.dr[7]);
1297 
1298 	DPRINTF("New state of the debug registers (r1):\n");
1299 	for (i = 0; i < __arraycount(r1.dr); i++)
1300 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1301 
1302 	DPRINTF("Call SETDBREGS for the child process (r1)\n");
1303 	SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1304 
1305 	DPRINTF("Call CONTINUE for the child process\n");
1306 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1307 
1308 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1309 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1310 
1311 	validate_status_stopped(status, SIGTRAP);
1312 
1313 	DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
1314 	SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
1315 
1316 	DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
1317 	DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
1318 	    info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
1319 	    info.psi_siginfo.si_errno);
1320 
1321 	DPRINTF("Before checking siginfo_t\n");
1322 	ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, SIGTRAP);
1323 	ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_DBREG);
1324 
1325 	DPRINTF("Remove code trap from check_happy=%p\n", check_happy);
1326 	dr7.bits.global_dr1_breakpoint = 0;
1327 	r1.dr[7] = dr7.raw;
1328 	DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1329 	    r1.dr[7]);
1330 
1331 	DPRINTF("Call SETDBREGS for the child process (r1)\n");
1332 	SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1333 
1334 	DPRINTF("Call CONTINUE for the child process\n");
1335 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1336 
1337 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1338 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1339 
1340 	validate_status_stopped(status, sigval);
1341 
1342 	DPRINTF("Before resuming the child process where it left off and "
1343 	    "without signal to be sent\n");
1344 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1345 
1346 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1347 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1348 
1349 	validate_status_exited(status, exitval);
1350 
1351 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1352 	TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1353 }
1354 #endif
1355 
1356 #if defined(HAVE_DBREGS)
1357 ATF_TC(dbregs_dr2_trap_code);
1358 ATF_TC_HEAD(dbregs_dr2_trap_code, tc)
1359 {
1360 	atf_tc_set_md_var(tc, "descr",
1361 	    "Verify that setting trap with DR2 triggers SIGTRAP "
1362 	    "(break on code execution trap)");
1363 }
1364 
1365 ATF_TC_BODY(dbregs_dr2_trap_code, tc)
1366 {
1367 	const int exitval = 5;
1368 	const int sigval = SIGSTOP;
1369 	pid_t child, wpid;
1370 #if defined(TWAIT_HAVE_STATUS)
1371 	int status;
1372 #endif
1373 	struct dbreg r1;
1374 	size_t i;
1375 	volatile int watchme = 1;
1376 	union u dr7;
1377 
1378 	struct ptrace_siginfo info;
1379 	memset(&info, 0, sizeof(info));
1380 
1381 	if (!can_we_set_dbregs()) {
1382 		atf_tc_skip("Either run this test as root or set sysctl(3) "
1383 		            "security.models.extensions.user_set_dbregs to 1");
1384 	}
1385 
1386 	dr7.raw = 0;
1387 	dr7.bits.global_dr2_breakpoint = 1;
1388 	dr7.bits.condition_dr2 = 0;	/* 0b00 -- break on code execution */
1389 	dr7.bits.len_dr2 = 0;		/* 0b00 -- 1 byte */
1390 
1391 	DPRINTF("Before forking process PID=%d\n", getpid());
1392 	SYSCALL_REQUIRE((child = fork()) != -1);
1393 	if (child == 0) {
1394 		DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1395 		FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1396 
1397 		DPRINTF("Before raising %s from child\n", strsignal(sigval));
1398 		FORKEE_ASSERT(raise(sigval) == 0);
1399 
1400 		printf("check_happy(%d)=%d\n", watchme, check_happy(watchme));
1401 
1402 		DPRINTF("Before raising %s from child\n", strsignal(sigval));
1403 		FORKEE_ASSERT(raise(sigval) == 0);
1404 
1405 		DPRINTF("Before exiting of the child process\n");
1406 		_exit(exitval);
1407 	}
1408 	DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1409 
1410 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1411 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1412 
1413 	validate_status_stopped(status, sigval);
1414 
1415 	DPRINTF("Call GETDBREGS for the child process (r1)\n");
1416 	SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1417 
1418 	DPRINTF("State of the debug registers (r1):\n");
1419 	for (i = 0; i < __arraycount(r1.dr); i++)
1420 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1421 
1422 	r1.dr[2] = (long)(intptr_t)check_happy;
1423 	DPRINTF("Set DR2 (r1.dr[2]) to new value %" PRIxREGISTER "\n",
1424 	    r1.dr[2]);
1425 
1426 	r1.dr[7] = dr7.raw;
1427 	DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1428 	    r1.dr[7]);
1429 
1430 	DPRINTF("New state of the debug registers (r1):\n");
1431 	for (i = 0; i < __arraycount(r1.dr); i++)
1432 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1433 
1434 	DPRINTF("Call SETDBREGS for the child process (r1)\n");
1435 	SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1436 
1437 	DPRINTF("Call CONTINUE for the child process\n");
1438 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1439 
1440 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1441 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1442 
1443 	validate_status_stopped(status, SIGTRAP);
1444 
1445 	DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
1446 	SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
1447 
1448 	DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
1449 	DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
1450 	    info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
1451 	    info.psi_siginfo.si_errno);
1452 
1453 	DPRINTF("Before checking siginfo_t\n");
1454 	ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, SIGTRAP);
1455 	ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_DBREG);
1456 
1457 	DPRINTF("Remove code trap from check_happy=%p\n", check_happy);
1458 	dr7.bits.global_dr2_breakpoint = 0;
1459 	r1.dr[7] = dr7.raw;
1460 	DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1461 	    r1.dr[7]);
1462 
1463 	DPRINTF("Call SETDBREGS for the child process (r1)\n");
1464 	SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1465 
1466 	DPRINTF("Call CONTINUE for the child process\n");
1467 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1468 
1469 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1470 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1471 
1472 	validate_status_stopped(status, sigval);
1473 
1474 	DPRINTF("Before resuming the child process where it left off and "
1475 	    "without signal to be sent\n");
1476 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1477 
1478 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1479 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1480 
1481 	validate_status_exited(status, exitval);
1482 
1483 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1484 	TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1485 }
1486 #endif
1487 
1488 #if defined(HAVE_DBREGS)
1489 ATF_TC(dbregs_dr3_trap_code);
1490 ATF_TC_HEAD(dbregs_dr3_trap_code, tc)
1491 {
1492 	atf_tc_set_md_var(tc, "descr",
1493 	    "Verify that setting trap with DR3 triggers SIGTRAP "
1494 	    "(break on code execution trap)");
1495 }
1496 
1497 ATF_TC_BODY(dbregs_dr3_trap_code, tc)
1498 {
1499 	const int exitval = 5;
1500 	const int sigval = SIGSTOP;
1501 	pid_t child, wpid;
1502 #if defined(TWAIT_HAVE_STATUS)
1503 	int status;
1504 #endif
1505 	struct dbreg r1;
1506 	size_t i;
1507 	volatile int watchme = 1;
1508 	union u dr7;
1509 
1510 	struct ptrace_siginfo info;
1511 	memset(&info, 0, sizeof(info));
1512 
1513 	if (!can_we_set_dbregs()) {
1514 		atf_tc_skip("Either run this test as root or set sysctl(3) "
1515 		            "security.models.extensions.user_set_dbregs to 1");
1516 	}
1517 
1518 	dr7.raw = 0;
1519 	dr7.bits.global_dr3_breakpoint = 1;
1520 	dr7.bits.condition_dr3 = 0;	/* 0b00 -- break on code execution */
1521 	dr7.bits.len_dr3 = 0;		/* 0b00 -- 1 byte */
1522 
1523 	DPRINTF("Before forking process PID=%d\n", getpid());
1524 	SYSCALL_REQUIRE((child = fork()) != -1);
1525 	if (child == 0) {
1526 		DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1527 		FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1528 
1529 		DPRINTF("Before raising %s from child\n", strsignal(sigval));
1530 		FORKEE_ASSERT(raise(sigval) == 0);
1531 
1532 		printf("check_happy(%d)=%d\n", watchme, check_happy(watchme));
1533 
1534 		DPRINTF("Before raising %s from child\n", strsignal(sigval));
1535 		FORKEE_ASSERT(raise(sigval) == 0);
1536 
1537 		DPRINTF("Before exiting of the child process\n");
1538 		_exit(exitval);
1539 	}
1540 	DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1541 
1542 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1543 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1544 
1545 	validate_status_stopped(status, sigval);
1546 
1547 	DPRINTF("Call GETDBREGS for the child process (r1)\n");
1548 	SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1549 
1550 	DPRINTF("State of the debug registers (r1):\n");
1551 	for (i = 0; i < __arraycount(r1.dr); i++)
1552 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1553 
1554 	r1.dr[3] = (long)(intptr_t)check_happy;
1555 	DPRINTF("Set DR3 (r1.dr[3]) to new value %" PRIxREGISTER "\n",
1556 	    r1.dr[3]);
1557 
1558 	r1.dr[7] = dr7.raw;
1559 	DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1560 	    r1.dr[7]);
1561 
1562 	DPRINTF("New state of the debug registers (r1):\n");
1563 	for (i = 0; i < __arraycount(r1.dr); i++)
1564 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1565 
1566 	DPRINTF("Call SETDBREGS for the child process (r1)\n");
1567 	SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1568 
1569 	DPRINTF("Call CONTINUE for the child process\n");
1570 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1571 
1572 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1573 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1574 
1575 	validate_status_stopped(status, SIGTRAP);
1576 
1577 	DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
1578 	SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
1579 
1580 	DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
1581 	DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
1582 	    info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
1583 	    info.psi_siginfo.si_errno);
1584 
1585 	DPRINTF("Before checking siginfo_t\n");
1586 	ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, SIGTRAP);
1587 	ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_DBREG);
1588 
1589 	DPRINTF("Remove code trap from check_happy=%p\n", check_happy);
1590 	dr7.bits.global_dr3_breakpoint = 0;
1591 	r1.dr[7] = dr7.raw;
1592 	DPRINTF("Set DR7 (r1.dr[7]) to new value %" PRIxREGISTER "\n",
1593 	    r1.dr[7]);
1594 
1595 	DPRINTF("Call SETDBREGS for the child process (r1)\n");
1596 	SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1597 
1598 	DPRINTF("Call CONTINUE for the child process\n");
1599 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1600 
1601 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1602 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1603 
1604 	validate_status_stopped(status, sigval);
1605 
1606 	DPRINTF("Before resuming the child process where it left off and "
1607 	    "without signal to be sent\n");
1608 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1609 
1610 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1611 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1612 
1613 	validate_status_exited(status, exitval);
1614 
1615 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1616 	TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1617 }
1618 #endif
1619 
1620 volatile lwpid_t x86_the_lwp_id = 0;
1621 
1622 static void __used
1623 x86_lwp_main_func(void *arg)
1624 {
1625 	x86_the_lwp_id = _lwp_self();
1626 	_lwp_exit();
1627 }
1628 
1629 static void
1630 dbregs_dont_inherit_lwp(int reg)
1631 {
1632 	const int exitval = 5;
1633 	const int sigval = SIGSTOP;
1634 	pid_t child, wpid;
1635 #if defined(TWAIT_HAVE_STATUS)
1636 	int status;
1637 #endif
1638 	ptrace_state_t state;
1639 	const int slen = sizeof(state);
1640 	ptrace_event_t event;
1641 	const int elen = sizeof(event);
1642 	ucontext_t uc;
1643 	lwpid_t lid;
1644 	static const size_t ssize = 16*1024;
1645 	void *stack;
1646 	size_t i;
1647 	struct dbreg r1;
1648 	struct dbreg r2;
1649 
1650 	if (!can_we_set_dbregs()) {
1651 		atf_tc_skip("Either run this test as root or set sysctl(3) "
1652 		            "security.models.extensions.user_set_dbregs to 1");
1653 	}
1654 
1655 	DPRINTF("Before forking process PID=%d\n", getpid());
1656 	SYSCALL_REQUIRE((child = fork()) != -1);
1657 	if (child == 0) {
1658 		DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1659 		FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1660 
1661 		DPRINTF("Before raising %s from child\n", strsignal(sigval));
1662 		FORKEE_ASSERT(raise(sigval) == 0);
1663 
1664 		DPRINTF("Before allocating memory for stack in child\n");
1665 		FORKEE_ASSERT((stack = malloc(ssize)) != NULL);
1666 
1667 		DPRINTF("Before making context for new lwp in child\n");
1668 		_lwp_makecontext(&uc, x86_lwp_main_func, NULL, NULL, stack,
1669 		    ssize);
1670 
1671 		DPRINTF("Before creating new in child\n");
1672 		FORKEE_ASSERT(_lwp_create(&uc, 0, &lid) == 0);
1673 
1674 		DPRINTF("Before waiting for lwp %d to exit\n", lid);
1675 		FORKEE_ASSERT(_lwp_wait(lid, NULL) == 0);
1676 
1677 		DPRINTF("Before verifying that reported %d and running lid %d "
1678 		    "are the same\n", lid, x86_the_lwp_id);
1679 		FORKEE_ASSERT_EQ(lid, x86_the_lwp_id);
1680 
1681 		DPRINTF("Before exiting of the child process\n");
1682 		_exit(exitval);
1683 	}
1684 	DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1685 
1686 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1687 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1688 
1689 	validate_status_stopped(status, sigval);
1690 
1691 	DPRINTF("Set empty EVENT_MASK for the child %d\n", child);
1692 	event.pe_set_event = PTRACE_LWP_CREATE;
1693 	SYSCALL_REQUIRE(ptrace(PT_SET_EVENT_MASK, child, &event, elen) != -1);
1694 
1695 	DPRINTF("Call GETDBREGS for the child process (r1)\n");
1696 	SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1697 
1698 	DPRINTF("State of the debug registers (r1):\n");
1699 	for (i = 0; i < __arraycount(r1.dr); i++)
1700 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1701 
1702 	r1.dr[reg] = (long)(intptr_t)check_happy;
1703 	DPRINTF("Set DR%d (r1.dr[%d]) to new value %" PRIxREGISTER "\n",
1704 	    reg, reg, r1.dr[0]);
1705 
1706 	DPRINTF("New state of the debug registers (r1):\n");
1707 	for (i = 0; i < __arraycount(r1.dr); i++)
1708 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1709 
1710 	DPRINTF("Call SETDBREGS for the child process (r1)\n");
1711 	SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1712 
1713 	DPRINTF("Before resuming the child process where it left off and "
1714 	    "without signal to be sent\n");
1715 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1716 
1717 	DPRINTF("Before calling %s() for the child - expected stopped "
1718 	    "SIGTRAP\n", TWAIT_FNAME);
1719 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1720 
1721 	validate_status_stopped(status, SIGTRAP);
1722 
1723 	SYSCALL_REQUIRE(ptrace(PT_GET_PROCESS_STATE, child, &state, slen) != -1);
1724 
1725 	ATF_REQUIRE_EQ(state.pe_report_event, PTRACE_LWP_CREATE);
1726 
1727 	lid = state.pe_lwp;
1728 	DPRINTF("Reported PTRACE_LWP_CREATE event with lid %d\n", lid);
1729 
1730 	DPRINTF("Call GETDBREGS for the child process new lwp (r2)\n");
1731 	SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r2, lid) != -1);
1732 
1733 	DPRINTF("State of the debug registers (r2):\n");
1734 	for (i = 0; i < __arraycount(r2.dr); i++)
1735 		DPRINTF("r2[%zu]=%" PRIxREGISTER "\n", i, r2.dr[i]);
1736 
1737 	DPRINTF("Assert that (r1) and (r2) are not the same\n");
1738 	ATF_REQUIRE(memcmp(&r1, &r2, sizeof(r1)) != 0);
1739 
1740 	DPRINTF("Before resuming the child process where it left off and "
1741 	    "without signal to be sent\n");
1742 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1743 
1744 	DPRINTF("Before calling %s() for the child - expected exited\n",
1745 	    TWAIT_FNAME);
1746 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1747 
1748 	validate_status_exited(status, exitval);
1749 
1750 	DPRINTF("Before calling %s() for the child - expected no process\n",
1751 	    TWAIT_FNAME);
1752 	TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1753 }
1754 
1755 ATF_TC(dbregs_dr0_dont_inherit_lwp);
1756 ATF_TC_HEAD(dbregs_dr0_dont_inherit_lwp, tc)
1757 {
1758 	atf_tc_set_md_var(tc, "descr",
1759 	    "Verify that 1 LWP creation is intercepted by ptrace(2) with "
1760 	    "EVENT_MASK set to PTRACE_LWP_CREATE and Debug Register 0 from "
1761 	    "the forker thread is not inherited");
1762 }
1763 
1764 ATF_TC_BODY(dbregs_dr0_dont_inherit_lwp, tc)
1765 {
1766 	dbregs_dont_inherit_lwp(0);
1767 }
1768 
1769 ATF_TC(dbregs_dr1_dont_inherit_lwp);
1770 ATF_TC_HEAD(dbregs_dr1_dont_inherit_lwp, tc)
1771 {
1772 	atf_tc_set_md_var(tc, "descr",
1773 	    "Verify that 1 LWP creation is intercepted by ptrace(2) with "
1774 	    "EVENT_MASK set to PTRACE_LWP_CREATE and Debug Register 1 from "
1775 	    "the forker thread is not inherited");
1776 }
1777 
1778 ATF_TC_BODY(dbregs_dr1_dont_inherit_lwp, tc)
1779 {
1780 	dbregs_dont_inherit_lwp(1);
1781 }
1782 
1783 ATF_TC(dbregs_dr2_dont_inherit_lwp);
1784 ATF_TC_HEAD(dbregs_dr2_dont_inherit_lwp, tc)
1785 {
1786 	atf_tc_set_md_var(tc, "descr",
1787 	    "Verify that 1 LWP creation is intercepted by ptrace(2) with "
1788 	    "EVENT_MASK set to PTRACE_LWP_CREATE and Debug Register 2 from "
1789 	    "the forker thread is not inherited");
1790 }
1791 
1792 ATF_TC_BODY(dbregs_dr2_dont_inherit_lwp, tc)
1793 {
1794 	dbregs_dont_inherit_lwp(2);
1795 }
1796 
1797 ATF_TC(dbregs_dr3_dont_inherit_lwp);
1798 ATF_TC_HEAD(dbregs_dr3_dont_inherit_lwp, tc)
1799 {
1800 	atf_tc_set_md_var(tc, "descr",
1801 	    "Verify that 1 LWP creation is intercepted by ptrace(2) with "
1802 	    "EVENT_MASK set to PTRACE_LWP_CREATE and Debug Register 3 from "
1803 	    "the forker thread is not inherited");
1804 }
1805 
1806 ATF_TC_BODY(dbregs_dr3_dont_inherit_lwp, tc)
1807 {
1808 	dbregs_dont_inherit_lwp(3);
1809 }
1810 
1811 static void
1812 dbregs_dont_inherit_execve(int reg)
1813 {
1814 	const int sigval = SIGTRAP;
1815 	pid_t child, wpid;
1816 #if defined(TWAIT_HAVE_STATUS)
1817 	int status;
1818 #endif
1819 	size_t i;
1820 	struct dbreg r1;
1821 	struct dbreg r2;
1822 
1823 	struct ptrace_siginfo info;
1824 	memset(&info, 0, sizeof(info));
1825 
1826 	if (!can_we_set_dbregs()) {
1827 		atf_tc_skip("Either run this test as root or set sysctl(3) "
1828 		            "security.models.extensions.user_set_dbregs to 1");
1829 	}
1830 
1831 	DPRINTF("Before forking process PID=%d\n", getpid());
1832 	SYSCALL_REQUIRE((child = fork()) != -1);
1833 	if (child == 0) {
1834 		DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
1835 		FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
1836 
1837 		DPRINTF("Before raising %s from child\n", strsignal(sigval));
1838 		FORKEE_ASSERT(raise(sigval) == 0);
1839 
1840 		DPRINTF("Before calling execve(2) from child\n");
1841 		execlp("/bin/echo", "/bin/echo", NULL);
1842 
1843 		FORKEE_ASSERT(0 && "Not reached");
1844 	}
1845 	DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
1846 
1847 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1848 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1849 
1850 	validate_status_stopped(status, sigval);
1851 
1852 	DPRINTF("Call GETDBREGS for the child process (r1)\n");
1853 	SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r1, 0) != -1);
1854 
1855 	DPRINTF("State of the debug registers (r1):\n");
1856 	for (i = 0; i < __arraycount(r1.dr); i++)
1857 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1858 
1859 	r1.dr[reg] = (long)(intptr_t)check_happy;
1860 	DPRINTF("Set DR%d (r1.dr[%d]) to new value %" PRIxREGISTER "\n",
1861 	    reg, reg, r1.dr[reg]);
1862 
1863 	DPRINTF("New state of the debug registers (r1):\n");
1864 	for (i = 0; i < __arraycount(r1.dr); i++)
1865 		DPRINTF("r1[%zu]=%" PRIxREGISTER "\n", i, r1.dr[i]);
1866 
1867 	DPRINTF("Call SETDBREGS for the child process (r1)\n");
1868 	SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r1, 0) != -1);
1869 
1870 	DPRINTF("Before resuming the child process where it left off and "
1871 	    "without signal to be sent\n");
1872 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1873 
1874 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1875 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1876 
1877 	validate_status_stopped(status, sigval);
1878 
1879 	DPRINTF("Before calling ptrace(2) with PT_GET_SIGINFO for child\n");
1880 	SYSCALL_REQUIRE(ptrace(PT_GET_SIGINFO, child, &info, sizeof(info)) != -1);
1881 
1882 	DPRINTF("Signal traced to lwpid=%d\n", info.psi_lwpid);
1883 	DPRINTF("Signal properties: si_signo=%#x si_code=%#x si_errno=%#x\n",
1884 	    info.psi_siginfo.si_signo, info.psi_siginfo.si_code,
1885 	    info.psi_siginfo.si_errno);
1886 
1887 	ATF_REQUIRE_EQ(info.psi_siginfo.si_signo, sigval);
1888 	ATF_REQUIRE_EQ(info.psi_siginfo.si_code, TRAP_EXEC);
1889 
1890 	DPRINTF("Call GETDBREGS for the child process after execve(2)\n");
1891 	SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r2, 0) != -1);
1892 
1893 	DPRINTF("State of the debug registers (r2):\n");
1894 	for (i = 0; i < __arraycount(r2.dr); i++)
1895 		DPRINTF("r2[%zu]=%" PRIxREGISTER "\n", i, r2.dr[i]);
1896 
1897 	DPRINTF("Assert that (r1) and (r2) are not the same\n");
1898 	ATF_REQUIRE(memcmp(&r1, &r2, sizeof(r1)) != 0);
1899 
1900 	DPRINTF("Before resuming the child process where it left off and "
1901 	    "without signal to be sent\n");
1902 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
1903 
1904 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1905 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
1906 
1907 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
1908 	TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
1909 }
1910 
1911 ATF_TC(dbregs_dr0_dont_inherit_execve);
1912 ATF_TC_HEAD(dbregs_dr0_dont_inherit_execve, tc)
1913 {
1914 	atf_tc_set_md_var(tc, "descr",
1915 	    "Verify that execve(2) is intercepted by tracer and Debug "
1916 	    "Register 0 is reset");
1917 }
1918 
1919 ATF_TC_BODY(dbregs_dr0_dont_inherit_execve, tc)
1920 {
1921 	dbregs_dont_inherit_execve(0);
1922 }
1923 
1924 ATF_TC(dbregs_dr1_dont_inherit_execve);
1925 ATF_TC_HEAD(dbregs_dr1_dont_inherit_execve, tc)
1926 {
1927 	atf_tc_set_md_var(tc, "descr",
1928 	    "Verify that execve(2) is intercepted by tracer and Debug "
1929 	    "Register 1 is reset");
1930 }
1931 
1932 ATF_TC_BODY(dbregs_dr1_dont_inherit_execve, tc)
1933 {
1934 	dbregs_dont_inherit_execve(1);
1935 }
1936 
1937 ATF_TC(dbregs_dr2_dont_inherit_execve);
1938 ATF_TC_HEAD(dbregs_dr2_dont_inherit_execve, tc)
1939 {
1940 	atf_tc_set_md_var(tc, "descr",
1941 	    "Verify that execve(2) is intercepted by tracer and Debug "
1942 	    "Register 2 is reset");
1943 }
1944 
1945 ATF_TC_BODY(dbregs_dr2_dont_inherit_execve, tc)
1946 {
1947 	dbregs_dont_inherit_execve(2);
1948 }
1949 
1950 ATF_TC(dbregs_dr3_dont_inherit_execve);
1951 ATF_TC_HEAD(dbregs_dr3_dont_inherit_execve, tc)
1952 {
1953 	atf_tc_set_md_var(tc, "descr",
1954 	    "Verify that execve(2) is intercepted by tracer and Debug "
1955 	    "Register 3 is reset");
1956 }
1957 
1958 ATF_TC_BODY(dbregs_dr3_dont_inherit_execve, tc)
1959 {
1960 	dbregs_dont_inherit_execve(3);
1961 }
1962 
1963 /// ----------------------------------------------------------------------------
1964 
1965 ATF_TC(x86_cve_2018_8897);
1966 ATF_TC_HEAD(x86_cve_2018_8897, tc)
1967 {
1968 	atf_tc_set_md_var(tc, "descr",
1969 	    "Verify mitigation for CVE-2018-8897 (POP SS debug exception)");
1970 }
1971 
1972 #define X86_CVE_2018_8897_PAGE 0x5000 /* page addressable by 32-bit registers */
1973 
1974 static void
1975 #ifdef __clang__
1976 __attribute__((optnone))
1977 #else
1978 __attribute__((__optimize__("O0")))
1979 #endif
1980 x86_cve_2018_8897_trigger(void)
1981 {
1982 	/*
1983 	 * A function to trigger the POP SS (CVE-2018-8897) vulnerability
1984 	 *
1985 	 * ifdef __x86_64__
1986 	 *
1987 	 * We need to switch to 32-bit mode execution on 64-bit kernel.
1988 	 * This is achieved with far jump instruction and GDT descriptor
1989 	 * set to 32-bit CS selector. The 32-bit CS selector is kernel
1990 	 * specific, in the NetBSD case registered as GUCODE32_SEL
1991 	 * that is equal to (14 (decimal) << 3) with GDT and user
1992 	 * privilege level (this makes it 0x73).
1993 	 *
1994 	 * In UNIX as(1) assembly x86_64 far jump is coded as ljmp.
1995 	 * amd64 ljmp requires an indirect address with cs:RIP.
1996 	 *
1997 	 * When we are running in 32-bit mode, it's similar to the
1998 	 * mode as if the binary had been launched in netbsd32.
1999 	 *
2000 	 * There are two versions of this exploit, one with RIP
2001 	 * relative code and the other with static addresses.
2002 	 * The first one is PIE code aware, the other no-PIE one.
2003 	 *
2004 	 *
2005 	 * After switching to the 32-bit mode we can move on to the remaining
2006 	 * part of the exploit.
2007 	 *
2008 	 * endif //  __x86_64__
2009 	 *
2010 	 * Set the stack pointer to the page we allocated earlier. Remember
2011 	 * that we put an SS selector exactly at this address, so we can pop.
2012 	 *
2013 	 * movl    $0x5000,%esp
2014 	 *
2015 	 * Pop the SS selector off the stack. This reloads the SS selector,
2016 	 * which is fine. Remember that we set DR0 at address 0x5000, which
2017 	 * we are now reading. Therefore, on this instruction, the CPU will
2018 	 * raise a #DB exception.
2019 	 *
2020 	 * But the "pop %ss" instruction is special: it blocks exceptions
2021 	 * until the next instruction is executed. So the #DB that we just
2022 	 * raised is actually blocked.
2023 	 *
2024 	 * pop %ss
2025 	 *
2026 	 * We are still here, and didn't receive the #DB. After we execute
2027 	 * this instruction, the effect of "pop %ss" will disappear, and
2028 	 * we will receive the #DB for real.
2029 	 *
2030 	 * int $4
2031 	 *
2032 	 * Here the bug happens. We executed "int $4", so we entered the
2033 	 * kernel, with interrupts disabled. The #DB that was pending is
2034 	 * received. But, it is received immediately in kernel mode, and is
2035 	 * _NOT_ received when interrupts are enabled again.
2036 	 *
2037 	 * It means that, in the first instruction of the $4 handler, we
2038 	 * think we are safe with interrupts disabled. But we aren't, and
2039 	 * just got interrupted.
2040 	 *
2041 	 * The new interrupt handler doesn't handle this particular context:
2042 	 * we are entered in kernel mode, the previous context was kernel
2043 	 * mode too but it still had the user context loaded.
2044 	 *
2045 	 * We find ourselves not doing a 'swapgs'. At the end of the day, it
2046 	 * means that we call trap() with a curcpu() that is fully
2047 	 * controllable by userland. From then on, it is easy to escalate
2048 	 * privileges.
2049 	 *
2050 	 * With SVS it also means we don't switch CR3, so this results in a
2051 	 * triple fault, which this time cannot be turned to a privilege
2052 	 * escalation.
2053 	 */
2054 
2055 #if __x86_64__
2056 #if __PIE__
2057 	void *csRIP;
2058 
2059 	csRIP = malloc(sizeof(int) + sizeof(short));
2060 	FORKEE_ASSERT(csRIP != NULL);
2061 
2062 	__asm__ __volatile__(
2063 		"	leal 24(%%eip), %%eax\n\t"
2064 		"	movq %0, %%rdx\n\t"
2065 		"	movl %%eax, (%%rdx)\n\t"
2066 		"	movw $0x73, 4(%%rdx)\n\t"
2067 		"	movq %1, %%rax\n\t"
2068 		"	ljmp *(%%rax)\n\t"
2069 		"	.code32\n\t"
2070 		"	movl $0x5000, %%esp\n\t"
2071 		"	pop %%ss\n\t"
2072 		"	int $4\n\t"
2073 		"	.code64\n\t"
2074 		: "=m"(csRIP)
2075 		: "m"(csRIP)
2076 		: "%rax", "%rdx", "%rsp"
2077 		);
2078 #else /* !__PIE__ */
2079 	__asm__ __volatile__(
2080 		"       movq $farjmp32, %%rax\n\t"
2081 		"       ljmp *(%%rax)\n\t"
2082 		"farjmp32:\n\t"
2083 		"       .long trigger32\n\t"
2084 		"       .word 0x73\n\t"
2085 		"       .code32\n\t"
2086 		"trigger32:\n\t"
2087 		"       movl $0x5000, %%esp\n\t"
2088 		"       pop %%ss\n\t"
2089 		"       int $4\n\t"
2090 		"       .code64\n\t"
2091 		:
2092 		:
2093 		: "%rax", "%rsp"
2094 		);
2095 #endif
2096 #elif __i386__
2097 	__asm__ __volatile__(
2098 		"movl $0x5000, %%esp\n\t"
2099 		"pop %%ss\n\t"
2100 		"int $4\n\t"
2101 		:
2102 		:
2103 		: "%esp"
2104 		);
2105 #endif
2106 }
2107 
2108 ATF_TC_BODY(x86_cve_2018_8897, tc)
2109 {
2110 	const int sigval = SIGSTOP;
2111 	pid_t child, wpid;
2112 #if defined(TWAIT_HAVE_STATUS)
2113 	int status;
2114 #endif
2115 	char *trap_page;
2116 	struct dbreg db;
2117 
2118 
2119 	if (!can_we_set_dbregs()) {
2120 		atf_tc_skip("Either run this test as root or set sysctl(3) "
2121 		            "security.models.extensions.user_set_dbregs to 1");
2122 	}
2123 
2124 	DPRINTF("Before forking process PID=%d\n", getpid());
2125 	SYSCALL_REQUIRE((child = fork()) != -1);
2126 	if (child == 0) {
2127 		DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
2128 		FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
2129 
2130 		trap_page = mmap((void *)X86_CVE_2018_8897_PAGE,
2131 		                 sysconf(_SC_PAGESIZE), PROT_READ|PROT_WRITE,
2132 		                 MAP_FIXED|MAP_ANON|MAP_PRIVATE, -1, 0);
2133 
2134 		/* trigger page fault */
2135 		memset(trap_page, 0, sysconf(_SC_PAGESIZE));
2136 
2137 		// kernel GDT
2138 #if __x86_64__
2139 		/* SS selector (descriptor 9 (0x4f >> 3)) */
2140 		*trap_page = 0x4f;
2141 #elif __i386__
2142 		/* SS selector (descriptor 4 (0x23 >> 3)) */
2143 		*trap_page = 0x23;
2144 #endif
2145 
2146 		DPRINTF("Before raising %s from child\n", strsignal(sigval));
2147 		FORKEE_ASSERT(raise(sigval) == 0);
2148 
2149 		x86_cve_2018_8897_trigger();
2150 
2151 		/* NOTREACHED */
2152 		FORKEE_ASSERTX(0 && "This shall not be reached");
2153 	}
2154 	DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
2155 
2156 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2157 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2158 
2159 	validate_status_stopped(status, sigval);
2160 
2161 	DPRINTF("Call GETDBREGS for the child process\n");
2162 	SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &db, 0) != -1);
2163 
2164 	/*
2165 	 * Set up the dbregs. We put the 0x5000 address in DR0.
2166 	 * It means that, the first time we touch this, the CPU will trigger a
2167 	 * #DB exception.
2168 	 */
2169 	db.dr[0] = X86_CVE_2018_8897_PAGE;
2170 	db.dr[7] = 0x30003;
2171 
2172 	DPRINTF("Call SETDBREGS for the child process\n");
2173 	SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &db, 0) != -1);
2174 
2175 	DPRINTF("Before resuming the child process where it left off and "
2176 	    "without signal to be sent\n");
2177 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
2178 
2179 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2180 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2181 
2182 	// In this test we receive SIGFPE, is this appropriate?
2183 //	validate_status_stopped(status, SIGFPE);
2184 
2185 	DPRINTF("Kill the child process\n");
2186 	SYSCALL_REQUIRE(ptrace(PT_KILL, child, NULL, 0) != -1);
2187 
2188 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2189 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2190 
2191 	validate_status_signaled(status, SIGKILL, 0);
2192 
2193 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2194 	TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
2195 }
2196 
2197 /// ----------------------------------------------------------------------------
2198 
2199 union x86_test_register {
2200 	struct {
2201 		uint64_t a, b, c, d;
2202 	} ymm;
2203 	struct {
2204 		uint64_t a, b;
2205 	} xmm;
2206 	uint64_t u64;
2207 	uint32_t u32;
2208 };
2209 
2210 enum x86_test_regset {
2211 	TEST_GPREGS,
2212 	TEST_FPREGS,
2213 	TEST_XMMREGS,
2214 	TEST_XSTATE
2215 };
2216 
2217 /* Please keep them grouped by acceptable x86_test_regset. */
2218 enum x86_test_registers {
2219 	/* TEST_GPREGS */
2220 	GPREGS_32,
2221 	GPREGS_32_EBP_ESP,
2222 	GPREGS_64,
2223 	GPREGS_64_R8,
2224 	/* TEST_FPREGS/TEST_XMMREGS */
2225 	FPREGS_MM,
2226 	FPREGS_XMM,
2227 	/* TEST_XSTATE */
2228 	FPREGS_YMM
2229 };
2230 
2231 enum x86_test_regmode {
2232 	TEST_GETREGS,
2233 	TEST_SETREGS,
2234 	TEST_COREDUMP
2235 };
2236 
2237 static __inline void get_gp32_regs(union x86_test_register out[])
2238 {
2239 #if defined(__i386__)
2240 	const uint32_t fill = 0x0F0F0F0F;
2241 
2242 	__asm__ __volatile__(
2243 		/* fill registers with clobber pattern */
2244 		"movl    %6, %%eax\n\t"
2245 		"movl    %6, %%ebx\n\t"
2246 		"movl    %6, %%ecx\n\t"
2247 		"movl    %6, %%edx\n\t"
2248 		"movl    %6, %%esi\n\t"
2249 		"movl    %6, %%edi\n\t"
2250 		"\n\t"
2251 		"int3\n\t"
2252 		: "=a"(out[0].u32), "=b"(out[1].u32), "=c"(out[2].u32),
2253 		  "=d"(out[3].u32), "=S"(out[4].u32), "=D"(out[5].u32)
2254 		: "g"(fill)
2255 	);
2256 #else
2257 	__unreachable();
2258 #endif
2259 }
2260 
2261 static __inline void set_gp32_regs(const union x86_test_register data[])
2262 {
2263 #if defined(__i386__)
2264 	__asm__ __volatile__(
2265 		"int3\n\t"
2266 		:
2267 		: "a"(data[0].u32), "b"(data[1].u32), "c"(data[2].u32),
2268 		  "d"(data[3].u32), "S"(data[4].u32), "D"(data[5].u32)
2269 		:
2270 	);
2271 #else
2272 	__unreachable();
2273 #endif
2274 }
2275 
2276 static __inline void get_gp32_ebp_esp_regs(union x86_test_register out[])
2277 {
2278 #if defined(__i386__)
2279 	const uint32_t fill = 0x0F0F0F0F;
2280 
2281 	__asm__ __volatile__(
2282 		/* save original ebp & esp using our output registers */
2283 		"movl    %%esp, %0\n\t"
2284 		"movl    %%ebp, %1\n\t"
2285 		/* fill them with clobber pattern */
2286 		"movl    %2, %%esp\n\t"
2287 		"movl    %2, %%ebp\n\t"
2288 		"\n\t"
2289 		"int3\n\t"
2290 		"\n\t"
2291 		/* restore ebp & esp, and save the result */
2292 		"xchgl   %%esp, %0\n\t"
2293 		"xchgl   %%ebp, %1\n\t"
2294 		: "=r"(out[0].u32), "=r"(out[1].u32)
2295 		: "g"(fill)
2296 		:
2297 	);
2298 #else
2299 	__unreachable();
2300 #endif
2301 }
2302 
2303 static __inline void set_gp32_ebp_esp_regs(const union x86_test_register data[])
2304 {
2305 #if defined(__i386__)
2306 	__asm__ __volatile__(
2307 		/* ebp & ebp are a bit tricky, we must not clobber them */
2308 		"movl    %%esp, %%eax\n\t"
2309 		"movl    %%ebp, %%ebx\n\t"
2310 		"movl    %0, %%esp\n\t"
2311 		"movl    %1, %%ebp\n\t"
2312 		"\n\t"
2313 		"int3\n\t"
2314 		"\n\t"
2315 		"movl    %%eax, %%esp\n\t"
2316 		"movl    %%ebx, %%ebp\n\t"
2317 		:
2318 		: "ri"(data[0].u32), "ri"(data[1].u32)
2319 		: "%eax", "%ebx"
2320 	);
2321 #else
2322 	__unreachable();
2323 #endif
2324 }
2325 
2326 static __inline void get_gp64_regs(union x86_test_register out[])
2327 {
2328 #if defined(__x86_64__)
2329 	const uint64_t fill = 0x0F0F0F0F0F0F0F0F;
2330 
2331 	__asm__ __volatile__(
2332 		/* save rsp & rbp */
2333 		"movq    %%rsp, %6\n\t"
2334 		"movq    %%rbp, %7\n\t"
2335 		"\n\t"
2336 		/* fill registers with clobber pattern */
2337 		"movq    %8, %%rax\n\t"
2338 		"movq    %8, %%rbx\n\t"
2339 		"movq    %8, %%rcx\n\t"
2340 		"movq    %8, %%rdx\n\t"
2341 		"movq    %8, %%rsp\n\t"
2342 		"movq    %8, %%rbp\n\t"
2343 		"movq    %8, %%rsi\n\t"
2344 		"movq    %8, %%rdi\n\t"
2345 		"\n\t"
2346 		"int3\n\t"
2347 		"\n\t"
2348 		/* swap saved & current rsp & rbp */
2349 		"xchgq    %%rsp, %6\n\t"
2350 		"xchgq    %%rbp, %7\n\t"
2351 		: "=a"(out[0].u64), "=b"(out[1].u64), "=c"(out[2].u64),
2352 		  "=d"(out[3].u64), "=S"(out[4].u64), "=D"(out[5].u64),
2353 		  "=r"(out[6].u64), "=r"(out[7].u64)
2354 		: "g"(fill)
2355 	);
2356 #else
2357 	__unreachable();
2358 #endif
2359 }
2360 
2361 static __inline void set_gp64_regs(const union x86_test_register data[])
2362 {
2363 #if defined(__x86_64__)
2364 	__asm__ __volatile__(
2365 		/* rbp & rbp are a bit tricky, we must not clobber them */
2366 		"movq    %%rsp, %%r8\n\t"
2367 		"movq    %%rbp, %%r9\n\t"
2368 		"movq    %6, %%rsp\n\t"
2369 		"movq    %7, %%rbp\n\t"
2370 		"\n\t"
2371 		"int3\n\t"
2372 		"\n\t"
2373 		"movq    %%r8, %%rsp\n\t"
2374 		"movq    %%r9, %%rbp\n\t"
2375 		:
2376 		: "a"(data[0].u64), "b"(data[1].u64), "c"(data[2].u64),
2377 		  "d"(data[3].u64), "S"(data[4].u64), "D"(data[5].u64),
2378 		  "r"(data[6].u64), "r"(data[7].u64)
2379 		: "%r8", "%r9"
2380 	);
2381 #else
2382 	__unreachable();
2383 #endif
2384 }
2385 
2386 static __inline void get_gp64_r8_regs(union x86_test_register out[])
2387 {
2388 #if defined(__x86_64__)
2389 	const uint64_t fill = 0x0F0F0F0F0F0F0F0F;
2390 
2391 	__asm__ __volatile__(
2392 		/* fill registers with clobber pattern */
2393 		"movq    %1, %%r8\n\t"
2394 		"movq    %1, %%r9\n\t"
2395 		"movq    %1, %%r10\n\t"
2396 		"movq    %1, %%r11\n\t"
2397 		"movq    %1, %%r12\n\t"
2398 		"movq    %1, %%r13\n\t"
2399 		"movq    %1, %%r14\n\t"
2400 		"movq    %1, %%r15\n\t"
2401 		"\n\t"
2402 		"int3\n\t"
2403 		"\n\t"
2404 		"movq    %%r8, 0x00(%0)\n\t"
2405 		"movq    %%r9, 0x20(%0)\n\t"
2406 		"movq    %%r10, 0x40(%0)\n\t"
2407 		"movq    %%r11, 0x60(%0)\n\t"
2408 		"movq    %%r12, 0x80(%0)\n\t"
2409 		"movq    %%r13, 0xA0(%0)\n\t"
2410 		"movq    %%r14, 0xC0(%0)\n\t"
2411 		"movq    %%r15, 0xE0(%0)\n\t"
2412 		:
2413 		: "a"(out), "m"(fill)
2414 		: "%r8", "%r9", "%r10", "%r11", "%r12", "%r13", "%r14", "%r15"
2415 	);
2416 #else
2417 	__unreachable();
2418 #endif
2419 }
2420 
2421 static __inline void set_gp64_r8_regs(const union x86_test_register data[])
2422 {
2423 #if defined(__x86_64__)
2424 	__asm__ __volatile__(
2425 		"movq    0x00(%0), %%r8\n\t"
2426 		"movq    0x20(%0), %%r9\n\t"
2427 		"movq    0x40(%0), %%r10\n\t"
2428 		"movq    0x60(%0), %%r11\n\t"
2429 		"movq    0x80(%0), %%r12\n\t"
2430 		"movq    0xA0(%0), %%r13\n\t"
2431 		"movq    0xC0(%0), %%r14\n\t"
2432 		"movq    0xE0(%0), %%r15\n\t"
2433 		"int3\n\t"
2434 		:
2435 		: "b"(data)
2436 		: "%r8", "%r9", "%r10", "%r11", "%r12", "%r13", "%r14", "%r15"
2437 	);
2438 #else
2439 	__unreachable();
2440 #endif
2441 }
2442 
2443 __attribute__((target("mmx")))
2444 static __inline void get_mm_regs(union x86_test_register out[])
2445 {
2446 	const uint64_t fill = 0x0F0F0F0F0F0F0F0F;
2447 
2448 	__asm__ __volatile__(
2449 		/* fill registers with clobber pattern */
2450 		"movq    %1, %%mm0\n\t"
2451 		"movq    %1, %%mm1\n\t"
2452 		"movq    %1, %%mm2\n\t"
2453 		"movq    %1, %%mm3\n\t"
2454 		"movq    %1, %%mm4\n\t"
2455 		"movq    %1, %%mm5\n\t"
2456 		"movq    %1, %%mm6\n\t"
2457 		"movq    %1, %%mm7\n\t"
2458 		"\n\t"
2459 		"int3\n\t"
2460 		"\n\t"
2461 		"movq    %%mm0, 0x00(%0)\n\t"
2462 		"movq    %%mm1, 0x20(%0)\n\t"
2463 		"movq    %%mm2, 0x40(%0)\n\t"
2464 		"movq    %%mm3, 0x60(%0)\n\t"
2465 		"movq    %%mm4, 0x80(%0)\n\t"
2466 		"movq    %%mm5, 0xA0(%0)\n\t"
2467 		"movq    %%mm6, 0xC0(%0)\n\t"
2468 		"movq    %%mm7, 0xE0(%0)\n\t"
2469 		:
2470 		: "a"(out), "m"(fill)
2471 		: "%mm0", "%mm1", "%mm2", "%mm3", "%mm4", "%mm5", "%mm6", "%mm7"
2472 	);
2473 }
2474 
2475 __attribute__((target("mmx")))
2476 static __inline void set_mm_regs(const union x86_test_register data[])
2477 {
2478 	__asm__ __volatile__(
2479 		"movq    0x00(%0), %%mm0\n\t"
2480 		"movq    0x20(%0), %%mm1\n\t"
2481 		"movq    0x40(%0), %%mm2\n\t"
2482 		"movq    0x60(%0), %%mm3\n\t"
2483 		"movq    0x80(%0), %%mm4\n\t"
2484 		"movq    0xA0(%0), %%mm5\n\t"
2485 		"movq    0xC0(%0), %%mm6\n\t"
2486 		"movq    0xE0(%0), %%mm7\n\t"
2487 		"int3\n\t"
2488 		:
2489 		: "b"(data)
2490 		: "%mm0", "%mm1", "%mm2", "%mm3", "%mm4", "%mm5", "%mm6", "%mm7"
2491 	);
2492 }
2493 
2494 __attribute__((target("sse")))
2495 static __inline void get_xmm_regs(union x86_test_register out[])
2496 {
2497 	union x86_test_register fill __aligned(32) = {
2498 		.xmm={ 0x0F0F0F0F0F0F0F0F, 0x0F0F0F0F0F0F0F0F }
2499 	};
2500 
2501 	__asm__ __volatile__(
2502 		/* fill registers with clobber pattern */
2503 		"movaps  %1, %%xmm0\n\t"
2504 		"movaps  %1, %%xmm1\n\t"
2505 		"movaps  %1, %%xmm2\n\t"
2506 		"movaps  %1, %%xmm3\n\t"
2507 		"movaps  %1, %%xmm4\n\t"
2508 		"movaps  %1, %%xmm5\n\t"
2509 		"movaps  %1, %%xmm6\n\t"
2510 		"movaps  %1, %%xmm7\n\t"
2511 #if defined(__x86_64__)
2512 		"movaps  %1, %%xmm8\n\t"
2513 		"movaps  %1, %%xmm9\n\t"
2514 		"movaps  %1, %%xmm10\n\t"
2515 		"movaps  %1, %%xmm11\n\t"
2516 		"movaps  %1, %%xmm12\n\t"
2517 		"movaps  %1, %%xmm13\n\t"
2518 		"movaps  %1, %%xmm14\n\t"
2519 		"movaps  %1, %%xmm15\n\t"
2520 #endif
2521 		"\n\t"
2522 		"int3\n\t"
2523 		"\n\t"
2524 		"movaps  %%xmm0, 0x000(%0)\n\t"
2525 		"movaps  %%xmm1, 0x020(%0)\n\t"
2526 		"movaps  %%xmm2, 0x040(%0)\n\t"
2527 		"movaps  %%xmm3, 0x060(%0)\n\t"
2528 		"movaps  %%xmm4, 0x080(%0)\n\t"
2529 		"movaps  %%xmm5, 0x0A0(%0)\n\t"
2530 		"movaps  %%xmm6, 0x0C0(%0)\n\t"
2531 		"movaps  %%xmm7, 0x0E0(%0)\n\t"
2532 #if defined(__x86_64__)
2533 		"movaps  %%xmm8, 0x100(%0)\n\t"
2534 		"movaps  %%xmm9, 0x120(%0)\n\t"
2535 		"movaps  %%xmm10, 0x140(%0)\n\t"
2536 		"movaps  %%xmm11, 0x160(%0)\n\t"
2537 		"movaps  %%xmm12, 0x180(%0)\n\t"
2538 		"movaps  %%xmm13, 0x1A0(%0)\n\t"
2539 		"movaps  %%xmm14, 0x1C0(%0)\n\t"
2540 		"movaps  %%xmm15, 0x1E0(%0)\n\t"
2541 #endif
2542 		:
2543 		: "a"(out), "m"(fill)
2544 		: "%xmm0", "%xmm1", "%xmm2", "%xmm3", "%xmm4", "%xmm5", "%xmm6", "%xmm7"
2545 #if defined(__x86_64__)
2546 		, "%xmm8", "%xmm9", "%xmm10", "%xmm11", "%xmm12", "%xmm13", "%xmm14",
2547 		"%xmm15"
2548 #endif
2549 	);
2550 }
2551 
2552 __attribute__((target("sse")))
2553 static __inline void set_xmm_regs(const union x86_test_register data[])
2554 {
2555 	__asm__ __volatile__(
2556 		"movaps   0x000(%0), %%xmm0\n\t"
2557 		"movaps   0x020(%0), %%xmm1\n\t"
2558 		"movaps   0x040(%0), %%xmm2\n\t"
2559 		"movaps   0x060(%0), %%xmm3\n\t"
2560 		"movaps   0x080(%0), %%xmm4\n\t"
2561 		"movaps   0x0A0(%0), %%xmm5\n\t"
2562 		"movaps   0x0C0(%0), %%xmm6\n\t"
2563 		"movaps   0x0E0(%0), %%xmm7\n\t"
2564 #if defined(__x86_64__)
2565 		"movaps   0x100(%0), %%xmm8\n\t"
2566 		"movaps   0x120(%0), %%xmm9\n\t"
2567 		"movaps   0x140(%0), %%xmm10\n\t"
2568 		"movaps   0x160(%0), %%xmm11\n\t"
2569 		"movaps   0x180(%0), %%xmm12\n\t"
2570 		"movaps   0x1A0(%0), %%xmm13\n\t"
2571 		"movaps   0x1C0(%0), %%xmm14\n\t"
2572 		"movaps   0x1E0(%0), %%xmm15\n\t"
2573 #endif
2574 		"int3\n\t"
2575 		:
2576 		: "b"(data)
2577 		: "%xmm0", "%xmm1", "%xmm2", "%xmm3", "%xmm4", "%xmm5", "%xmm6",
2578 		"%xmm7"
2579 #if defined(__x86_64__)
2580 		, "%xmm8", "%xmm9", "%xmm10", "%xmm11", "%xmm12", "%xmm13",
2581 		"%xmm14", "%xmm15"
2582 #endif
2583 	);
2584 }
2585 
2586 __attribute__((target("avx")))
2587 static __inline void get_ymm_regs(union x86_test_register out[])
2588 {
2589 	union x86_test_register fill __aligned(32) = {
2590 		{ 0x0F0F0F0F0F0F0F0F, 0x0F0F0F0F0F0F0F0F,
2591 		  0x0F0F0F0F0F0F0F0F, 0x0F0F0F0F0F0F0F0F }
2592 	};
2593 
2594 	__asm__ __volatile__(
2595 		/* fill registers with clobber pattern */
2596 		"vmovaps  %1, %%ymm0\n\t"
2597 		"vmovaps  %1, %%ymm1\n\t"
2598 		"vmovaps  %1, %%ymm2\n\t"
2599 		"vmovaps  %1, %%ymm3\n\t"
2600 		"vmovaps  %1, %%ymm4\n\t"
2601 		"vmovaps  %1, %%ymm5\n\t"
2602 		"vmovaps  %1, %%ymm6\n\t"
2603 		"vmovaps  %1, %%ymm7\n\t"
2604 #if defined(__x86_64__)
2605 		"vmovaps  %1, %%ymm8\n\t"
2606 		"vmovaps  %1, %%ymm9\n\t"
2607 		"vmovaps  %1, %%ymm10\n\t"
2608 		"vmovaps  %1, %%ymm11\n\t"
2609 		"vmovaps  %1, %%ymm12\n\t"
2610 		"vmovaps  %1, %%ymm13\n\t"
2611 		"vmovaps  %1, %%ymm14\n\t"
2612 		"vmovaps  %1, %%ymm15\n\t"
2613 #endif
2614 		"\n\t"
2615 		"int3\n\t"
2616 		"\n\t"
2617 		"vmovaps %%ymm0,  0x000(%0)\n\t"
2618 		"vmovaps %%ymm1,  0x020(%0)\n\t"
2619 		"vmovaps %%ymm2,  0x040(%0)\n\t"
2620 		"vmovaps %%ymm3,  0x060(%0)\n\t"
2621 		"vmovaps %%ymm4,  0x080(%0)\n\t"
2622 		"vmovaps %%ymm5,  0x0A0(%0)\n\t"
2623 		"vmovaps %%ymm6,  0x0C0(%0)\n\t"
2624 		"vmovaps %%ymm7,  0x0E0(%0)\n\t"
2625 #if defined(__x86_64__)
2626 		"vmovaps %%ymm8,  0x100(%0)\n\t"
2627 		"vmovaps %%ymm9,  0x120(%0)\n\t"
2628 		"vmovaps %%ymm10, 0x140(%0)\n\t"
2629 		"vmovaps %%ymm11, 0x160(%0)\n\t"
2630 		"vmovaps %%ymm12, 0x180(%0)\n\t"
2631 		"vmovaps %%ymm13, 0x1A0(%0)\n\t"
2632 		"vmovaps %%ymm14, 0x1C0(%0)\n\t"
2633 		"vmovaps %%ymm15, 0x1E0(%0)\n\t"
2634 #endif
2635 		:
2636 		: "a"(out), "m"(fill)
2637 		: "%ymm0", "%ymm1", "%ymm2", "%ymm3", "%ymm4", "%ymm5", "%ymm6", "%ymm7"
2638 #if defined(__x86_64__)
2639 		, "%ymm8", "%ymm9", "%ymm10", "%ymm11", "%ymm12", "%ymm13", "%ymm14",
2640 		"%ymm15"
2641 #endif
2642 	);
2643 }
2644 
2645 __attribute__((target("avx")))
2646 static __inline void set_ymm_regs(const union x86_test_register data[])
2647 {
2648 	__asm__ __volatile__(
2649 		"vmovaps  0x000(%0), %%ymm0\n\t"
2650 		"vmovaps  0x020(%0), %%ymm1\n\t"
2651 		"vmovaps  0x040(%0), %%ymm2\n\t"
2652 		"vmovaps  0x060(%0), %%ymm3\n\t"
2653 		"vmovaps  0x080(%0), %%ymm4\n\t"
2654 		"vmovaps  0x0A0(%0), %%ymm5\n\t"
2655 		"vmovaps  0x0C0(%0), %%ymm6\n\t"
2656 		"vmovaps  0x0E0(%0), %%ymm7\n\t"
2657 #if defined(__x86_64__)
2658 		"vmovaps  0x100(%0), %%ymm8\n\t"
2659 		"vmovaps  0x120(%0), %%ymm9\n\t"
2660 		"vmovaps  0x140(%0), %%ymm10\n\t"
2661 		"vmovaps  0x160(%0), %%ymm11\n\t"
2662 		"vmovaps  0x180(%0), %%ymm12\n\t"
2663 		"vmovaps  0x1A0(%0), %%ymm13\n\t"
2664 		"vmovaps  0x1C0(%0), %%ymm14\n\t"
2665 		"vmovaps  0x1E0(%0), %%ymm15\n\t"
2666 #endif
2667 		"int3\n\t"
2668 		:
2669 		: "b"(data)
2670 		: "%ymm0", "%ymm1", "%ymm2", "%ymm3", "%ymm4", "%ymm5", "%ymm6",
2671 		"%ymm7"
2672 #if defined(__x86_64__)
2673 		, "%ymm8", "%ymm9", "%ymm10", "%ymm11", "%ymm12", "%ymm13",
2674 		"%ymm14", "%ymm15"
2675 #endif
2676 	);
2677 }
2678 
2679 static void
2680 x86_register_test(enum x86_test_regset regset, enum x86_test_registers regs,
2681     enum x86_test_regmode regmode)
2682 {
2683 	const int exitval = 5;
2684 	pid_t child, wpid;
2685 #if defined(TWAIT_HAVE_STATUS)
2686 	const int sigval = SIGTRAP;
2687 	int status;
2688 #endif
2689 	struct reg gpr;
2690 	struct fpreg fpr;
2691 #if defined(__i386__)
2692 	struct xmmregs xmm;
2693 #endif
2694 	struct xstate xst;
2695 	struct iovec iov;
2696 	struct fxsave* fxs = NULL;
2697 	uint64_t xst_flags = 0;
2698 	char core_path[] = "/tmp/core.XXXXXX";
2699 	int core_fd;
2700 
2701 	const union x86_test_register expected[] __aligned(32) = {
2702 		{{ 0x0706050403020100, 0x0F0E0D0C0B0A0908,
2703 		   0x1716151413121110, 0x1F1E1D1C1B1A1918, }},
2704 		{{ 0x0807060504030201, 0x100F0E0D0C0B0A09,
2705 		   0x1817161514131211, 0x201F1E1D1C1B1A19, }},
2706 		{{ 0x0908070605040302, 0x11100F0E0D0C0B0A,
2707 		   0x1918171615141312, 0x21201F1E1D1C1B1A, }},
2708 		{{ 0x0A09080706050403, 0x1211100F0E0D0C0B,
2709 		   0x1A19181716151413, 0x2221201F1E1D1C1B, }},
2710 		{{ 0x0B0A090807060504, 0x131211100F0E0D0C,
2711 		   0x1B1A191817161514, 0x232221201F1E1D1C, }},
2712 		{{ 0x0C0B0A0908070605, 0x14131211100F0E0D,
2713 		   0x1C1B1A1918171615, 0x24232221201F1E1D, }},
2714 		{{ 0x0D0C0B0A09080706, 0x1514131211100F0E,
2715 		   0x1D1C1B1A19181716, 0x2524232221201F1E, }},
2716 		{{ 0x0E0D0C0B0A090807, 0x161514131211100F,
2717 		   0x1E1D1C1B1A191817, 0x262524232221201F, }},
2718 		{{ 0x0F0E0D0C0B0A0908, 0x1716151413121110,
2719 		   0x1F1E1D1C1B1A1918, 0x2726252423222120, }},
2720 		{{ 0x100F0E0D0C0B0A09, 0x1817161514131211,
2721 		   0x201F1E1D1C1B1A19, 0x2827262524232221, }},
2722 		{{ 0x11100F0E0D0C0B0A, 0x1918171615141312,
2723 		   0x21201F1E1D1C1B1A, 0x2928272625242322, }},
2724 		{{ 0x1211100F0E0D0C0B, 0x1A19181716151413,
2725 		   0x2221201F1E1D1C1B, 0x2A29282726252423, }},
2726 		{{ 0x131211100F0E0D0C, 0x1B1A191817161514,
2727 		   0x232221201F1E1D1C, 0x2B2A292827262524, }},
2728 		{{ 0x14131211100F0E0D, 0x1C1B1A1918171615,
2729 		   0x24232221201F1E1D, 0x2C2B2A2928272625, }},
2730 		{{ 0x1514131211100F0E, 0x1D1C1B1A19181716,
2731 		   0x2524232221201F1E, 0x2D2C2B2A29282726, }},
2732 		{{ 0x161514131211100F, 0x1E1D1C1B1A191817,
2733 		   0x262524232221201F, 0x2E2D2C2B2A292827, }},
2734 	};
2735 
2736 	bool need_32 = false, need_64 = false, need_cpuid = false;
2737 
2738 	switch (regs) {
2739 	case GPREGS_32:
2740 	case GPREGS_32_EBP_ESP:
2741 		need_32 = true;
2742 		break;
2743 	case GPREGS_64:
2744 	case GPREGS_64_R8:
2745 		need_64 = true;
2746 		break;
2747 	case FPREGS_MM:
2748 	case FPREGS_XMM:
2749 	case FPREGS_YMM:
2750 		need_cpuid = true;
2751 		break;
2752 	}
2753 
2754 	if (need_32) {
2755 #if defined(__x86_64__)
2756 		atf_tc_skip("Test requires 32-bit mode");
2757 #endif
2758 	}
2759 	if (need_64) {
2760 #if defined(__i386__)
2761 		atf_tc_skip("Test requires 64-bit mode");
2762 #endif
2763 	}
2764 
2765 	if (need_cpuid) {
2766 		/* verify whether needed instruction sets are supported here */
2767 		unsigned int eax, ebx, ecx, edx;
2768 
2769 		DPRINTF("Before invoking cpuid\n");
2770 		if (!__get_cpuid(1, &eax, &ebx, &ecx, &edx))
2771 			atf_tc_skip("CPUID is not supported by the CPU");
2772 
2773 		DPRINTF("cpuid: ECX = %08x, EDX = %08xd\n", ecx, edx);
2774 
2775 		switch (regs) {
2776 		case FPREGS_YMM:
2777 			if (!(ecx & bit_AVX))
2778 				atf_tc_skip("AVX is not supported by the CPU");
2779 			/*FALLTHROUGH*/
2780 		case FPREGS_XMM:
2781 			if (!(edx & bit_SSE))
2782 				atf_tc_skip("SSE is not supported by the CPU");
2783 			break;
2784 		case FPREGS_MM:
2785 			if (!(edx & bit_MMX))
2786 				atf_tc_skip("MMX is not supported by the CPU");
2787 			break;
2788 		case GPREGS_32:
2789 		case GPREGS_32_EBP_ESP:
2790 		case GPREGS_64:
2791 		case GPREGS_64_R8:
2792 			__unreachable();
2793 		}
2794 	}
2795 
2796 	DPRINTF("Before forking process PID=%d\n", getpid());
2797 	SYSCALL_REQUIRE((child = fork()) != -1);
2798 	if (child == 0) {
2799 		union x86_test_register vals[16] __aligned(32);
2800 
2801 		DPRINTF("Before calling PT_TRACE_ME from child %d\n", getpid());
2802 		FORKEE_ASSERT(ptrace(PT_TRACE_ME, 0, NULL, 0) != -1);
2803 
2804 		DPRINTF("Before running assembly from child\n");
2805 		switch (regmode) {
2806 		case TEST_GETREGS:
2807 		case TEST_COREDUMP:
2808 			switch (regs) {
2809 			case GPREGS_32:
2810 				set_gp32_regs(expected);
2811 				break;
2812 			case GPREGS_32_EBP_ESP:
2813 				set_gp32_ebp_esp_regs(expected);
2814 				break;
2815 			case GPREGS_64:
2816 				set_gp64_regs(expected);
2817 				break;
2818 			case GPREGS_64_R8:
2819 				set_gp64_r8_regs(expected);
2820 				break;
2821 			case FPREGS_MM:
2822 				set_mm_regs(expected);
2823 				break;
2824 			case FPREGS_XMM:
2825 				set_xmm_regs(expected);
2826 				break;
2827 			case FPREGS_YMM:
2828 				set_ymm_regs(expected);
2829 				break;
2830 			}
2831 			break;
2832 		case TEST_SETREGS:
2833 			switch (regs) {
2834 			case GPREGS_32:
2835 				get_gp32_regs(vals);
2836 				break;
2837 			case GPREGS_32_EBP_ESP:
2838 				get_gp32_ebp_esp_regs(vals);
2839 				break;
2840 			case GPREGS_64:
2841 				get_gp64_regs(vals);
2842 				break;
2843 			case GPREGS_64_R8:
2844 				get_gp64_r8_regs(vals);
2845 				break;
2846 			case FPREGS_MM:
2847 				get_mm_regs(vals);
2848 				break;
2849 			case FPREGS_XMM:
2850 				get_xmm_regs(vals);
2851 				break;
2852 			case FPREGS_YMM:
2853 				get_ymm_regs(vals);
2854 				break;
2855 			}
2856 
2857 			DPRINTF("Before comparing results\n");
2858 			switch (regs) {
2859 			case GPREGS_32:
2860 				FORKEE_ASSERT(!memcmp(&vals[5].u32,
2861 				    &expected[5].u32, sizeof(vals->u32)));
2862 				FORKEE_ASSERT(!memcmp(&vals[4].u32,
2863 				    &expected[4].u32, sizeof(vals->u32)));
2864 				FORKEE_ASSERT(!memcmp(&vals[3].u32,
2865 				    &expected[3].u32, sizeof(vals->u32)));
2866 				FORKEE_ASSERT(!memcmp(&vals[2].u32,
2867 				    &expected[2].u32, sizeof(vals->u32)));
2868 				/*FALLTHROUGH*/
2869 			case GPREGS_32_EBP_ESP:
2870 				FORKEE_ASSERT(!memcmp(&vals[1].u32,
2871 				    &expected[1].u32, sizeof(vals->u32)));
2872 				FORKEE_ASSERT(!memcmp(&vals[0].u32,
2873 				    &expected[0].u32, sizeof(vals->u32)));
2874 				break;
2875 			case GPREGS_64:
2876 			case GPREGS_64_R8:
2877 			case FPREGS_MM:
2878 				FORKEE_ASSERT(!memcmp(&vals[0].u64,
2879 				    &expected[0].u64, sizeof(vals->u64)));
2880 				FORKEE_ASSERT(!memcmp(&vals[1].u64,
2881 				    &expected[1].u64, sizeof(vals->u64)));
2882 				FORKEE_ASSERT(!memcmp(&vals[2].u64,
2883 				    &expected[2].u64, sizeof(vals->u64)));
2884 				FORKEE_ASSERT(!memcmp(&vals[3].u64,
2885 				    &expected[3].u64, sizeof(vals->u64)));
2886 				FORKEE_ASSERT(!memcmp(&vals[4].u64,
2887 				    &expected[4].u64, sizeof(vals->u64)));
2888 				FORKEE_ASSERT(!memcmp(&vals[5].u64,
2889 				    &expected[5].u64, sizeof(vals->u64)));
2890 				FORKEE_ASSERT(!memcmp(&vals[6].u64,
2891 				    &expected[6].u64, sizeof(vals->u64)));
2892 				FORKEE_ASSERT(!memcmp(&vals[7].u64,
2893 				    &expected[7].u64, sizeof(vals->u64)));
2894 				break;
2895 			case FPREGS_XMM:
2896 				FORKEE_ASSERT(!memcmp(&vals[0].xmm,
2897 				    &expected[0].xmm, sizeof(vals->xmm)));
2898 				FORKEE_ASSERT(!memcmp(&vals[1].xmm,
2899 				    &expected[1].xmm, sizeof(vals->xmm)));
2900 				FORKEE_ASSERT(!memcmp(&vals[2].xmm,
2901 				    &expected[2].xmm, sizeof(vals->xmm)));
2902 				FORKEE_ASSERT(!memcmp(&vals[3].xmm,
2903 				    &expected[3].xmm, sizeof(vals->xmm)));
2904 				FORKEE_ASSERT(!memcmp(&vals[4].xmm,
2905 				    &expected[4].xmm, sizeof(vals->xmm)));
2906 				FORKEE_ASSERT(!memcmp(&vals[5].xmm,
2907 				    &expected[5].xmm, sizeof(vals->xmm)));
2908 				FORKEE_ASSERT(!memcmp(&vals[6].xmm,
2909 				    &expected[6].xmm, sizeof(vals->xmm)));
2910 				FORKEE_ASSERT(!memcmp(&vals[7].xmm,
2911 				    &expected[7].xmm, sizeof(vals->xmm)));
2912 #if defined(__x86_64__)
2913 				FORKEE_ASSERT(!memcmp(&vals[8].xmm,
2914 				    &expected[8].xmm, sizeof(vals->xmm)));
2915 				FORKEE_ASSERT(!memcmp(&vals[9].xmm,
2916 				    &expected[9].xmm, sizeof(vals->xmm)));
2917 				FORKEE_ASSERT(!memcmp(&vals[10].xmm,
2918 				    &expected[10].xmm, sizeof(vals->xmm)));
2919 				FORKEE_ASSERT(!memcmp(&vals[11].xmm,
2920 				    &expected[11].xmm, sizeof(vals->xmm)));
2921 				FORKEE_ASSERT(!memcmp(&vals[12].xmm,
2922 				    &expected[12].xmm, sizeof(vals->xmm)));
2923 				FORKEE_ASSERT(!memcmp(&vals[13].xmm,
2924 				    &expected[13].xmm, sizeof(vals->xmm)));
2925 				FORKEE_ASSERT(!memcmp(&vals[14].xmm,
2926 				    &expected[14].xmm, sizeof(vals->xmm)));
2927 				FORKEE_ASSERT(!memcmp(&vals[15].xmm,
2928 				    &expected[15].xmm, sizeof(vals->xmm)));
2929 #endif
2930 				break;
2931 			case FPREGS_YMM:
2932 				FORKEE_ASSERT(!memcmp(&vals[0].ymm,
2933 				    &expected[0].ymm, sizeof(vals->ymm)));
2934 				FORKEE_ASSERT(!memcmp(&vals[1].ymm,
2935 				    &expected[1].ymm, sizeof(vals->ymm)));
2936 				FORKEE_ASSERT(!memcmp(&vals[2].ymm,
2937 				    &expected[2].ymm, sizeof(vals->ymm)));
2938 				FORKEE_ASSERT(!memcmp(&vals[3].ymm,
2939 				    &expected[3].ymm, sizeof(vals->ymm)));
2940 				FORKEE_ASSERT(!memcmp(&vals[4].ymm,
2941 				    &expected[4].ymm, sizeof(vals->ymm)));
2942 				FORKEE_ASSERT(!memcmp(&vals[5].ymm,
2943 				    &expected[5].ymm, sizeof(vals->ymm)));
2944 				FORKEE_ASSERT(!memcmp(&vals[6].ymm,
2945 				    &expected[6].ymm, sizeof(vals->ymm)));
2946 				FORKEE_ASSERT(!memcmp(&vals[7].ymm,
2947 				    &expected[7].ymm, sizeof(vals->ymm)));
2948 #if defined(__x86_64__)
2949 				FORKEE_ASSERT(!memcmp(&vals[8].ymm,
2950 				    &expected[8].ymm, sizeof(vals->ymm)));
2951 				FORKEE_ASSERT(!memcmp(&vals[9].ymm,
2952 				    &expected[9].ymm, sizeof(vals->ymm)));
2953 				FORKEE_ASSERT(!memcmp(&vals[10].ymm,
2954 				    &expected[10].ymm, sizeof(vals->ymm)));
2955 				FORKEE_ASSERT(!memcmp(&vals[11].ymm,
2956 				    &expected[11].ymm, sizeof(vals->ymm)));
2957 				FORKEE_ASSERT(!memcmp(&vals[12].ymm,
2958 				    &expected[12].ymm, sizeof(vals->ymm)));
2959 				FORKEE_ASSERT(!memcmp(&vals[13].ymm,
2960 				    &expected[13].ymm, sizeof(vals->ymm)));
2961 				FORKEE_ASSERT(!memcmp(&vals[14].ymm,
2962 				    &expected[14].ymm, sizeof(vals->ymm)));
2963 				FORKEE_ASSERT(!memcmp(&vals[15].ymm,
2964 				    &expected[15].ymm, sizeof(vals->ymm)));
2965 #endif
2966 				break;
2967 			}
2968 			break;
2969 		}
2970 
2971 		DPRINTF("Before exiting of the child process\n");
2972 		_exit(exitval);
2973 	}
2974 	DPRINTF("Parent process PID=%d, child's PID=%d\n", getpid(), child);
2975 
2976 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
2977 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
2978 
2979 	validate_status_stopped(status, sigval);
2980 
2981 	if (regset == TEST_XSTATE) {
2982 		switch (regs) {
2983 		case FPREGS_MM:
2984 			xst_flags |= XCR0_X87;
2985 			break;
2986 		case FPREGS_YMM:
2987 			xst_flags |= XCR0_YMM_Hi128;
2988 			/*FALLTHROUGH*/
2989 		case FPREGS_XMM:
2990 			xst_flags |= XCR0_SSE;
2991 			break;
2992 		case GPREGS_32:
2993 		case GPREGS_32_EBP_ESP:
2994 		case GPREGS_64:
2995 		case GPREGS_64_R8:
2996 			__unreachable();
2997 			break;
2998 		}
2999 	}
3000 
3001 	switch (regmode) {
3002 	case TEST_GETREGS:
3003 	case TEST_SETREGS:
3004 		switch (regset) {
3005 		case TEST_GPREGS:
3006 			ATF_REQUIRE(regs < FPREGS_MM);
3007 			DPRINTF("Call GETREGS for the child process\n");
3008 			SYSCALL_REQUIRE(ptrace(PT_GETREGS, child, &gpr, 0)
3009 			    != -1);
3010 			break;
3011 		case TEST_XMMREGS:
3012 #if defined(__i386__)
3013 			ATF_REQUIRE(regs >= FPREGS_MM && regs < FPREGS_YMM);
3014 			DPRINTF("Call GETXMMREGS for the child process\n");
3015 			SYSCALL_REQUIRE(ptrace(PT_GETXMMREGS, child, &xmm, 0)
3016 			    != -1);
3017 			fxs = &xmm.fxstate;
3018 			break;
3019 #else
3020 			/*FALLTHROUGH*/
3021 #endif
3022 		case TEST_FPREGS:
3023 #if defined(__x86_64__)
3024 			ATF_REQUIRE(regs >= FPREGS_MM && regs < FPREGS_YMM);
3025 			fxs = &fpr.fxstate;
3026 #else
3027 			ATF_REQUIRE(regs >= FPREGS_MM && regs < FPREGS_XMM);
3028 #endif
3029 			DPRINTF("Call GETFPREGS for the child process\n");
3030 			SYSCALL_REQUIRE(ptrace(PT_GETFPREGS, child, &fpr, 0)
3031 			    != -1);
3032 			break;
3033 		case TEST_XSTATE:
3034 			ATF_REQUIRE(regs >= FPREGS_MM);
3035 			iov.iov_base = &xst;
3036 			iov.iov_len = sizeof(xst);
3037 
3038 			DPRINTF("Call GETXSTATE for the child process\n");
3039 			SYSCALL_REQUIRE(ptrace(PT_GETXSTATE, child, &iov, 0)
3040 			    != -1);
3041 
3042 			ATF_REQUIRE((xst.xs_rfbm & xst_flags) == xst_flags);
3043 			switch (regmode) {
3044 			case TEST_SETREGS:
3045 				xst.xs_rfbm = xst_flags;
3046 				xst.xs_xstate_bv = xst_flags;
3047 				break;
3048 			case TEST_GETREGS:
3049 				ATF_REQUIRE((xst.xs_xstate_bv & xst_flags)
3050 				    == xst_flags);
3051 				break;
3052 			case TEST_COREDUMP:
3053 				__unreachable();
3054 				break;
3055 			}
3056 
3057 			fxs = &xst.xs_fxsave;
3058 			break;
3059 		}
3060 		break;
3061 	case TEST_COREDUMP:
3062 		SYSCALL_REQUIRE((core_fd = mkstemp(core_path)) != -1);
3063 		close(core_fd);
3064 
3065 		DPRINTF("Call DUMPCORE for the child process\n");
3066 		SYSCALL_REQUIRE(ptrace(PT_DUMPCORE, child, core_path,
3067 		    strlen(core_path)) != -1);
3068 
3069 		switch (regset) {
3070 		case TEST_GPREGS:
3071 			ATF_REQUIRE(regs < FPREGS_MM);
3072 			DPRINTF("Parse core file for PT_GETREGS\n");
3073 			ATF_REQUIRE_EQ(core_find_note(core_path,
3074 			    "NetBSD-CORE@1", PT_GETREGS, &gpr, sizeof(gpr)),
3075 			    sizeof(gpr));
3076 			break;
3077 		case TEST_XMMREGS:
3078 #if defined(__i386__)
3079 			ATF_REQUIRE(regs >= FPREGS_MM && regs < FPREGS_YMM);
3080 			unlink(core_path);
3081 			atf_tc_skip("XMMREGS not supported in core dumps");
3082 			break;
3083 #else
3084 			/*FALLTHROUGH*/
3085 #endif
3086 		case TEST_FPREGS:
3087 #if defined(__x86_64__)
3088 			ATF_REQUIRE(regs >= FPREGS_MM && regs < FPREGS_YMM);
3089 			fxs = &fpr.fxstate;
3090 #else
3091 			ATF_REQUIRE(regs >= FPREGS_MM && regs < FPREGS_XMM);
3092 #endif
3093 			DPRINTF("Parse core file for PT_GETFPREGS\n");
3094 			ATF_REQUIRE_EQ(core_find_note(core_path,
3095 			    "NetBSD-CORE@1", PT_GETFPREGS, &fpr, sizeof(fpr)),
3096 			    sizeof(fpr));
3097 			break;
3098 		case TEST_XSTATE:
3099 			ATF_REQUIRE(regs >= FPREGS_MM);
3100 			DPRINTF("Parse core file for PT_GETXSTATE\n");
3101 			ATF_REQUIRE_EQ(core_find_note(core_path,
3102 			    "NetBSD-CORE@1", PT_GETXSTATE, &xst, sizeof(xst)),
3103 			    sizeof(xst));
3104 			ATF_REQUIRE((xst.xs_xstate_bv & xst_flags)
3105 			    == xst_flags);
3106 			fxs = &xst.xs_fxsave;
3107 			break;
3108 		}
3109 		unlink(core_path);
3110 	}
3111 
3112 #if defined(__x86_64__)
3113 #define MM_REG(n) fpr.fxstate.fx_87_ac[n].r.f87_mantissa
3114 #else
3115 #define MM_REG(n) fpr.fstate.s87_ac[n].f87_mantissa
3116 #endif
3117 
3118 	switch (regmode) {
3119 	case TEST_GETREGS:
3120 	case TEST_COREDUMP:
3121 		switch (regs) {
3122 		case GPREGS_32:
3123 #if defined(__i386__)
3124 			ATF_CHECK_EQ((uint32_t)gpr.r_eax, expected[0].u32);
3125 			ATF_CHECK_EQ((uint32_t)gpr.r_ebx, expected[1].u32);
3126 			ATF_CHECK_EQ((uint32_t)gpr.r_ecx, expected[2].u32);
3127 			ATF_CHECK_EQ((uint32_t)gpr.r_edx, expected[3].u32);
3128 			ATF_CHECK_EQ((uint32_t)gpr.r_esi, expected[4].u32);
3129 			ATF_CHECK_EQ((uint32_t)gpr.r_edi, expected[5].u32);
3130 #endif
3131 			break;
3132 		case GPREGS_32_EBP_ESP:
3133 #if defined(__i386__)
3134 			ATF_CHECK_EQ((uint32_t)gpr.r_esp, expected[0].u32);
3135 			ATF_CHECK_EQ((uint32_t)gpr.r_ebp, expected[1].u32);
3136 #endif
3137 			break;
3138 		case GPREGS_64:
3139 #if defined(__x86_64__)
3140 			ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_RAX],
3141 			    expected[0].u64);
3142 			ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_RBX],
3143 			    expected[1].u64);
3144 			ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_RCX],
3145 			    expected[2].u64);
3146 			ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_RDX],
3147 			    expected[3].u64);
3148 			ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_RSI],
3149 			    expected[4].u64);
3150 			ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_RDI],
3151 			    expected[5].u64);
3152 			ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_RSP],
3153 			    expected[6].u64);
3154 			ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_RBP],
3155 			    expected[7].u64);
3156 #endif
3157 			break;
3158 		case GPREGS_64_R8:
3159 #if defined(__x86_64__)
3160 			ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_R8],
3161 			    expected[0].u64);
3162 			ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_R9],
3163 			    expected[1].u64);
3164 			ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_R10],
3165 			    expected[2].u64);
3166 			ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_R11],
3167 			    expected[3].u64);
3168 			ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_R12],
3169 			    expected[4].u64);
3170 			ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_R13],
3171 			    expected[5].u64);
3172 			ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_R14],
3173 			    expected[6].u64);
3174 			ATF_CHECK_EQ((uint64_t)gpr.regs[_REG_R15],
3175 			    expected[7].u64);
3176 #endif
3177 			break;
3178 		case FPREGS_MM:
3179 			if (regset == TEST_FPREGS) {
3180 				ATF_CHECK_EQ(MM_REG(0), expected[0].u64);
3181 				ATF_CHECK_EQ(MM_REG(1), expected[1].u64);
3182 				ATF_CHECK_EQ(MM_REG(2), expected[2].u64);
3183 				ATF_CHECK_EQ(MM_REG(3), expected[3].u64);
3184 				ATF_CHECK_EQ(MM_REG(4), expected[4].u64);
3185 				ATF_CHECK_EQ(MM_REG(5), expected[5].u64);
3186 				ATF_CHECK_EQ(MM_REG(6), expected[6].u64);
3187 				ATF_CHECK_EQ(MM_REG(7), expected[7].u64);
3188 			} else {
3189 				ATF_CHECK_EQ(fxs->fx_87_ac[0].r.f87_mantissa,
3190 			    expected[0].u64);
3191 				ATF_CHECK_EQ(fxs->fx_87_ac[1].r.f87_mantissa,
3192 			    expected[1].u64);
3193 				ATF_CHECK_EQ(fxs->fx_87_ac[2].r.f87_mantissa,
3194 			    expected[2].u64);
3195 				ATF_CHECK_EQ(fxs->fx_87_ac[3].r.f87_mantissa,
3196 			    expected[3].u64);
3197 				ATF_CHECK_EQ(fxs->fx_87_ac[4].r.f87_mantissa,
3198 			    expected[4].u64);
3199 				ATF_CHECK_EQ(fxs->fx_87_ac[5].r.f87_mantissa,
3200 			    expected[5].u64);
3201 				ATF_CHECK_EQ(fxs->fx_87_ac[6].r.f87_mantissa,
3202 			    expected[6].u64);
3203 				ATF_CHECK_EQ(fxs->fx_87_ac[7].r.f87_mantissa,
3204 			    expected[7].u64);
3205 			}
3206 			break;
3207 		case FPREGS_YMM:
3208 			ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[0],
3209 			    &expected[0].ymm.c, sizeof(expected->ymm)/2));
3210 			ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[1],
3211 			    &expected[1].ymm.c, sizeof(expected->ymm)/2));
3212 			ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[2],
3213 			    &expected[2].ymm.c, sizeof(expected->ymm)/2));
3214 			ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[3],
3215 			    &expected[3].ymm.c, sizeof(expected->ymm)/2));
3216 			ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[4],
3217 			    &expected[4].ymm.c, sizeof(expected->ymm)/2));
3218 			ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[5],
3219 			    &expected[5].ymm.c, sizeof(expected->ymm)/2));
3220 			ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[6],
3221 			    &expected[6].ymm.c, sizeof(expected->ymm)/2));
3222 			ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[7],
3223 			    &expected[7].ymm.c, sizeof(expected->ymm)/2));
3224 #if defined(__x86_64__)
3225 			ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[8],
3226 			    &expected[8].ymm.c, sizeof(expected->ymm)/2));
3227 			ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[9],
3228 			    &expected[9].ymm.c, sizeof(expected->ymm)/2));
3229 			ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[10],
3230 			    &expected[10].ymm.c, sizeof(expected->ymm)/2));
3231 			ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[11],
3232 			    &expected[11].ymm.c, sizeof(expected->ymm)/2));
3233 			ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[12],
3234 			    &expected[12].ymm.c, sizeof(expected->ymm)/2));
3235 			ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[13],
3236 			    &expected[13].ymm.c, sizeof(expected->ymm)/2));
3237 			ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[14],
3238 			    &expected[14].ymm.c, sizeof(expected->ymm)/2));
3239 			ATF_CHECK(!memcmp(&xst.xs_ymm_hi128.xs_ymm[15],
3240 			    &expected[15].ymm.c, sizeof(expected->ymm)/2));
3241 #endif
3242 			/*FALLTHROUGH*/
3243 		case FPREGS_XMM:
3244 			ATF_CHECK(!memcmp(&fxs->fx_xmm[0], &expected[0].ymm.a,
3245 			    sizeof(expected->ymm)/2));
3246 			ATF_CHECK(!memcmp(&fxs->fx_xmm[1], &expected[1].ymm.a,
3247 			    sizeof(expected->ymm)/2));
3248 			ATF_CHECK(!memcmp(&fxs->fx_xmm[2], &expected[2].ymm.a,
3249 			    sizeof(expected->ymm)/2));
3250 			ATF_CHECK(!memcmp(&fxs->fx_xmm[3], &expected[3].ymm.a,
3251 			    sizeof(expected->ymm)/2));
3252 			ATF_CHECK(!memcmp(&fxs->fx_xmm[4], &expected[4].ymm.a,
3253 			    sizeof(expected->ymm)/2));
3254 			ATF_CHECK(!memcmp(&fxs->fx_xmm[5], &expected[5].ymm.a,
3255 			    sizeof(expected->ymm)/2));
3256 			ATF_CHECK(!memcmp(&fxs->fx_xmm[6], &expected[6].ymm.a,
3257 			    sizeof(expected->ymm)/2));
3258 			ATF_CHECK(!memcmp(&fxs->fx_xmm[7], &expected[7].ymm.a,
3259 			    sizeof(expected->ymm)/2));
3260 #if defined(__x86_64__)
3261 			ATF_CHECK(!memcmp(&fxs->fx_xmm[8], &expected[8].ymm.a,
3262 			    sizeof(expected->ymm)/2));
3263 			ATF_CHECK(!memcmp(&fxs->fx_xmm[9], &expected[9].ymm.a,
3264 			    sizeof(expected->ymm)/2));
3265 			ATF_CHECK(!memcmp(&fxs->fx_xmm[10], &expected[10].ymm.a,
3266 			    sizeof(expected->ymm)/2));
3267 			ATF_CHECK(!memcmp(&fxs->fx_xmm[11], &expected[11].ymm.a,
3268 			    sizeof(expected->ymm)/2));
3269 			ATF_CHECK(!memcmp(&fxs->fx_xmm[12], &expected[12].ymm.a,
3270 			    sizeof(expected->ymm)/2));
3271 			ATF_CHECK(!memcmp(&fxs->fx_xmm[13], &expected[13].ymm.a,
3272 			    sizeof(expected->ymm)/2));
3273 			ATF_CHECK(!memcmp(&fxs->fx_xmm[14], &expected[14].ymm.a,
3274 			    sizeof(expected->ymm)/2));
3275 			ATF_CHECK(!memcmp(&fxs->fx_xmm[15], &expected[15].ymm.a,
3276 			    sizeof(expected->ymm)/2));
3277 #endif
3278 			break;
3279 		}
3280 		break;
3281 	case TEST_SETREGS:
3282 		switch (regs) {
3283 		case GPREGS_32:
3284 #if defined(__i386__)
3285 			gpr.r_eax = expected[0].u32;
3286 			gpr.r_ebx = expected[1].u32;
3287 			gpr.r_ecx = expected[2].u32;
3288 			gpr.r_edx = expected[3].u32;
3289 			gpr.r_esi = expected[4].u32;
3290 			gpr.r_edi = expected[5].u32;
3291 #endif
3292 			break;
3293 		case GPREGS_32_EBP_ESP:
3294 #if defined(__i386__)
3295 			gpr.r_esp = expected[0].u32;
3296 			gpr.r_ebp = expected[1].u32;
3297 #endif
3298 			break;
3299 		case GPREGS_64:
3300 #if defined(__x86_64__)
3301 			gpr.regs[_REG_RAX] = expected[0].u64;
3302 			gpr.regs[_REG_RBX] = expected[1].u64;
3303 			gpr.regs[_REG_RCX] = expected[2].u64;
3304 			gpr.regs[_REG_RDX] = expected[3].u64;
3305 			gpr.regs[_REG_RSI] = expected[4].u64;
3306 			gpr.regs[_REG_RDI] = expected[5].u64;
3307 			gpr.regs[_REG_RSP] = expected[6].u64;
3308 			gpr.regs[_REG_RBP] = expected[7].u64;
3309 #endif
3310 			break;
3311 		case GPREGS_64_R8:
3312 #if defined(__x86_64__)
3313 			gpr.regs[_REG_R8] = expected[0].u64;
3314 			gpr.regs[_REG_R9] = expected[1].u64;
3315 			gpr.regs[_REG_R10] = expected[2].u64;
3316 			gpr.regs[_REG_R11] = expected[3].u64;
3317 			gpr.regs[_REG_R12] = expected[4].u64;
3318 			gpr.regs[_REG_R13] = expected[5].u64;
3319 			gpr.regs[_REG_R14] = expected[6].u64;
3320 			gpr.regs[_REG_R15] = expected[7].u64;
3321 #endif
3322 			break;
3323 		case FPREGS_MM:
3324 			if (regset == TEST_FPREGS) {
3325 				MM_REG(0) = expected[0].u64;
3326 				MM_REG(1) = expected[1].u64;
3327 				MM_REG(2) = expected[2].u64;
3328 				MM_REG(3) = expected[3].u64;
3329 				MM_REG(4) = expected[4].u64;
3330 				MM_REG(5) = expected[5].u64;
3331 				MM_REG(6) = expected[6].u64;
3332 				MM_REG(7) = expected[7].u64;
3333 			} else {
3334 				fxs->fx_87_ac[0].r.f87_mantissa =
3335 				    expected[0].u64;
3336 				fxs->fx_87_ac[1].r.f87_mantissa =
3337 				    expected[1].u64;
3338 				fxs->fx_87_ac[2].r.f87_mantissa =
3339 				    expected[2].u64;
3340 				fxs->fx_87_ac[3].r.f87_mantissa =
3341 				    expected[3].u64;
3342 				fxs->fx_87_ac[4].r.f87_mantissa =
3343 				    expected[4].u64;
3344 				fxs->fx_87_ac[5].r.f87_mantissa =
3345 				    expected[5].u64;
3346 				fxs->fx_87_ac[6].r.f87_mantissa =
3347 				    expected[6].u64;
3348 				fxs->fx_87_ac[7].r.f87_mantissa =
3349 				    expected[7].u64;
3350 			}
3351 			break;
3352 		case FPREGS_YMM:
3353 			memcpy(&xst.xs_ymm_hi128.xs_ymm[0],
3354 			    &expected[0].ymm.c, sizeof(expected->ymm)/2);
3355 			memcpy(&xst.xs_ymm_hi128.xs_ymm[1],
3356 			    &expected[1].ymm.c, sizeof(expected->ymm)/2);
3357 			memcpy(&xst.xs_ymm_hi128.xs_ymm[2],
3358 			    &expected[2].ymm.c, sizeof(expected->ymm)/2);
3359 			memcpy(&xst.xs_ymm_hi128.xs_ymm[3],
3360 			    &expected[3].ymm.c, sizeof(expected->ymm)/2);
3361 			memcpy(&xst.xs_ymm_hi128.xs_ymm[4],
3362 			    &expected[4].ymm.c, sizeof(expected->ymm)/2);
3363 			memcpy(&xst.xs_ymm_hi128.xs_ymm[5],
3364 			    &expected[5].ymm.c, sizeof(expected->ymm)/2);
3365 			memcpy(&xst.xs_ymm_hi128.xs_ymm[6],
3366 			    &expected[6].ymm.c, sizeof(expected->ymm)/2);
3367 			memcpy(&xst.xs_ymm_hi128.xs_ymm[7],
3368 			    &expected[7].ymm.c, sizeof(expected->ymm)/2);
3369 #if defined(__x86_64__)
3370 			memcpy(&xst.xs_ymm_hi128.xs_ymm[8],
3371 			    &expected[8].ymm.c, sizeof(expected->ymm)/2);
3372 			memcpy(&xst.xs_ymm_hi128.xs_ymm[9],
3373 			    &expected[9].ymm.c, sizeof(expected->ymm)/2);
3374 			memcpy(&xst.xs_ymm_hi128.xs_ymm[10],
3375 			    &expected[10].ymm.c, sizeof(expected->ymm)/2);
3376 			memcpy(&xst.xs_ymm_hi128.xs_ymm[11],
3377 			    &expected[11].ymm.c, sizeof(expected->ymm)/2);
3378 			memcpy(&xst.xs_ymm_hi128.xs_ymm[12],
3379 			    &expected[12].ymm.c, sizeof(expected->ymm)/2);
3380 			memcpy(&xst.xs_ymm_hi128.xs_ymm[13],
3381 			    &expected[13].ymm.c, sizeof(expected->ymm)/2);
3382 			memcpy(&xst.xs_ymm_hi128.xs_ymm[14],
3383 			    &expected[14].ymm.c, sizeof(expected->ymm)/2);
3384 			memcpy(&xst.xs_ymm_hi128.xs_ymm[15],
3385 			    &expected[15].ymm.c, sizeof(expected->ymm)/2);
3386 #endif
3387 			/*FALLTHROUGH*/
3388 		case FPREGS_XMM:
3389 			memcpy(&fxs->fx_xmm[0], &expected[0].ymm.a,
3390 			    sizeof(expected->ymm)/2);
3391 			memcpy(&fxs->fx_xmm[1], &expected[1].ymm.a,
3392 			    sizeof(expected->ymm)/2);
3393 			memcpy(&fxs->fx_xmm[2], &expected[2].ymm.a,
3394 			    sizeof(expected->ymm)/2);
3395 			memcpy(&fxs->fx_xmm[3], &expected[3].ymm.a,
3396 			    sizeof(expected->ymm)/2);
3397 			memcpy(&fxs->fx_xmm[4], &expected[4].ymm.a,
3398 			    sizeof(expected->ymm)/2);
3399 			memcpy(&fxs->fx_xmm[5], &expected[5].ymm.a,
3400 			    sizeof(expected->ymm)/2);
3401 			memcpy(&fxs->fx_xmm[6], &expected[6].ymm.a,
3402 			    sizeof(expected->ymm)/2);
3403 			memcpy(&fxs->fx_xmm[7], &expected[7].ymm.a,
3404 			    sizeof(expected->ymm)/2);
3405 #if defined(__x86_64__)
3406 			memcpy(&fxs->fx_xmm[8], &expected[8].ymm.a,
3407 			    sizeof(expected->ymm)/2);
3408 			memcpy(&fxs->fx_xmm[9], &expected[9].ymm.a,
3409 			    sizeof(expected->ymm)/2);
3410 			memcpy(&fxs->fx_xmm[10], &expected[10].ymm.a,
3411 			    sizeof(expected->ymm)/2);
3412 			memcpy(&fxs->fx_xmm[11], &expected[11].ymm.a,
3413 			    sizeof(expected->ymm)/2);
3414 			memcpy(&fxs->fx_xmm[12], &expected[12].ymm.a,
3415 			    sizeof(expected->ymm)/2);
3416 			memcpy(&fxs->fx_xmm[13], &expected[13].ymm.a,
3417 			    sizeof(expected->ymm)/2);
3418 			memcpy(&fxs->fx_xmm[14], &expected[14].ymm.a,
3419 			    sizeof(expected->ymm)/2);
3420 			memcpy(&fxs->fx_xmm[15], &expected[15].ymm.a,
3421 			    sizeof(expected->ymm)/2);
3422 #endif
3423 			break;
3424 		}
3425 
3426 		switch (regset) {
3427 		case TEST_GPREGS:
3428 			DPRINTF("Call SETREGS for the child process\n");
3429 			SYSCALL_REQUIRE(ptrace(PT_SETREGS, child, &gpr, 0)
3430 			    != -1);
3431 			break;
3432 		case TEST_XMMREGS:
3433 #if defined(__i386__)
3434 			DPRINTF("Call SETXMMREGS for the child process\n");
3435 			SYSCALL_REQUIRE(ptrace(PT_SETXMMREGS, child, &xmm, 0)
3436 			    != -1);
3437 			break;
3438 #else
3439 			/*FALLTHROUGH*/
3440 #endif
3441 		case TEST_FPREGS:
3442 			DPRINTF("Call SETFPREGS for the child process\n");
3443 			SYSCALL_REQUIRE(ptrace(PT_SETFPREGS, child, &fpr, 0)
3444 			    != -1);
3445 			break;
3446 		case TEST_XSTATE:
3447 			DPRINTF("Call SETXSTATE for the child process\n");
3448 			SYSCALL_REQUIRE(ptrace(PT_SETXSTATE, child, &iov, 0)
3449 			    != -1);
3450 			break;
3451 		}
3452 		break;
3453 	}
3454 
3455 #undef MM_REG
3456 
3457 	DPRINTF("Before resuming the child process where it left off and "
3458 	    "without signal to be sent\n");
3459 	SYSCALL_REQUIRE(ptrace(PT_CONTINUE, child, (void *)1, 0) != -1);
3460 
3461 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
3462 	TWAIT_REQUIRE_SUCCESS(wpid = TWAIT_GENERIC(child, &status, 0), child);
3463 
3464 	validate_status_exited(status, exitval);
3465 
3466 	DPRINTF("Before calling %s() for the child\n", TWAIT_FNAME);
3467 	TWAIT_REQUIRE_FAILURE(ECHILD, wpid = TWAIT_GENERIC(child, &status, 0));
3468 }
3469 
3470 #define X86_REGISTER_TEST(test, regset, regs, regmode, descr)		\
3471 ATF_TC(test);								\
3472 ATF_TC_HEAD(test, tc)							\
3473 {									\
3474 	atf_tc_set_md_var(tc, "descr", descr);				\
3475 }									\
3476 									\
3477 ATF_TC_BODY(test, tc)							\
3478 {									\
3479 	x86_register_test(regset, regs, regmode);			\
3480 }
3481 
3482 X86_REGISTER_TEST(x86_gpregs32_read, TEST_GPREGS, GPREGS_32, TEST_GETREGS,
3483     "Test reading basic 32-bit gp registers from debugged program "
3484     "via PT_GETREGS.");
3485 X86_REGISTER_TEST(x86_gpregs32_write, TEST_GPREGS, GPREGS_32, TEST_SETREGS,
3486     "Test writing basic 32-bit gp registers into debugged program "
3487     "via PT_SETREGS.");
3488 X86_REGISTER_TEST(x86_gpregs32_core, TEST_GPREGS, GPREGS_32, TEST_COREDUMP,
3489     "Test reading basic 32-bit gp registers from core dump.");
3490 X86_REGISTER_TEST(x86_gpregs32_ebp_esp_read, TEST_GPREGS, GPREGS_32_EBP_ESP,
3491     TEST_GETREGS, "Test reading ebp & esp registers from debugged program "
3492     "via PT_GETREGS.");
3493 X86_REGISTER_TEST(x86_gpregs32_ebp_esp_write, TEST_GPREGS, GPREGS_32_EBP_ESP,
3494     TEST_SETREGS, "Test writing ebp & esp registers into debugged program "
3495     "via PT_SETREGS.");
3496 X86_REGISTER_TEST(x86_gpregs32_ebp_esp_core, TEST_GPREGS, GPREGS_32_EBP_ESP,
3497     TEST_COREDUMP, "Test reading ebp & esp registers from core dump.");
3498 
3499 X86_REGISTER_TEST(x86_gpregs64_read, TEST_GPREGS, GPREGS_64, TEST_GETREGS,
3500     "Test reading basic 64-bit gp registers from debugged program "
3501     "via PT_GETREGS.");
3502 X86_REGISTER_TEST(x86_gpregs64_write, TEST_GPREGS, GPREGS_64, TEST_SETREGS,
3503     "Test writing basic 64-bit gp registers into debugged program "
3504     "via PT_SETREGS.");
3505 X86_REGISTER_TEST(x86_gpregs64_core, TEST_GPREGS, GPREGS_64, TEST_COREDUMP,
3506     "Test reading basic 64-bit gp registers from core dump.");
3507 X86_REGISTER_TEST(x86_gpregs64_r8_read, TEST_GPREGS, GPREGS_64_R8, TEST_GETREGS,
3508     "Test reading r8..r15 registers from debugged program via PT_GETREGS.");
3509 X86_REGISTER_TEST(x86_gpregs64_r8_write, TEST_GPREGS, GPREGS_64_R8,
3510     TEST_SETREGS, "Test writing r8..r15 registers into debugged program "
3511     "via PT_SETREGS.");
3512 X86_REGISTER_TEST(x86_gpregs64_r8_core, TEST_GPREGS, GPREGS_64_R8,
3513     TEST_COREDUMP, "Test reading r8..r15 registers from core dump.");
3514 
3515 X86_REGISTER_TEST(x86_fpregs_mm_read, TEST_FPREGS, FPREGS_MM, TEST_GETREGS,
3516     "Test reading mm0..mm7 registers from debugged program "
3517     "via PT_GETFPREGS.");
3518 X86_REGISTER_TEST(x86_fpregs_mm_write, TEST_FPREGS, FPREGS_MM, TEST_SETREGS,
3519     "Test writing mm0..mm7 registers into debugged program "
3520     "via PT_SETFPREGS.");
3521 X86_REGISTER_TEST(x86_fpregs_mm_core, TEST_FPREGS, FPREGS_MM, TEST_COREDUMP,
3522     "Test reading mm0..mm7 registers from coredump.");
3523 X86_REGISTER_TEST(x86_fpregs_xmm_read, TEST_XMMREGS, FPREGS_XMM, TEST_GETREGS,
3524     "Test reading xmm0..xmm15 (..xmm7 on i386) from debugged program "
3525     "via PT_GETFPREGS (PT_GETXMMREGS on i386).");
3526 X86_REGISTER_TEST(x86_fpregs_xmm_write, TEST_XMMREGS, FPREGS_XMM, TEST_SETREGS,
3527     "Test writing xmm0..xmm15 (..xmm7 on i386) into debugged program "
3528     "via PT_SETFPREGS (PT_SETXMMREGS on i386).");
3529 X86_REGISTER_TEST(x86_fpregs_xmm_core, TEST_XMMREGS, FPREGS_XMM, TEST_COREDUMP,
3530     "Test reading xmm0..xmm15 (..xmm7 on i386) from coredump.");
3531 
3532 X86_REGISTER_TEST(x86_xstate_mm_read, TEST_XSTATE, FPREGS_MM, TEST_GETREGS,
3533     "Test reading mm0..mm7 registers from debugged program "
3534     "via PT_GETXSTATE.");
3535 X86_REGISTER_TEST(x86_xstate_mm_write, TEST_XSTATE, FPREGS_MM, TEST_SETREGS,
3536     "Test writing mm0..mm7 registers into debugged program "
3537     "via PT_SETXSTATE.");
3538 X86_REGISTER_TEST(x86_xstate_mm_core, TEST_XSTATE, FPREGS_MM, TEST_COREDUMP,
3539     "Test reading mm0..mm7 registers from core dump via XSTATE note.");
3540 X86_REGISTER_TEST(x86_xstate_xmm_read, TEST_XSTATE, FPREGS_XMM, TEST_GETREGS,
3541     "Test reading xmm0..xmm15 (..xmm7 on i386) from debugged program "
3542     "via PT_GETXSTATE.");
3543 X86_REGISTER_TEST(x86_xstate_xmm_write, TEST_XSTATE, FPREGS_XMM, TEST_SETREGS,
3544     "Test writing xmm0..xmm15 (..xmm7 on i386) into debugged program "
3545     "via PT_SETXSTATE.");
3546 X86_REGISTER_TEST(x86_xstate_xmm_core, TEST_XSTATE, FPREGS_XMM, TEST_COREDUMP,
3547     "Test reading xmm0..xmm15 (..xmm7 on i386) from coredump via XSTATE note.");
3548 X86_REGISTER_TEST(x86_xstate_ymm_read, TEST_XSTATE, FPREGS_YMM, TEST_GETREGS,
3549     "Test reading ymm0..ymm15 (..ymm7 on i386) from debugged program "
3550     "via PT_GETXSTATE.");
3551 X86_REGISTER_TEST(x86_xstate_ymm_write, TEST_XSTATE, FPREGS_YMM, TEST_SETREGS,
3552     "Test writing ymm0..ymm15 (..ymm7 on i386) into debugged program "
3553     "via PT_SETXSTATE.");
3554 X86_REGISTER_TEST(x86_xstate_ymm_core, TEST_XSTATE, FPREGS_YMM, TEST_COREDUMP,
3555     "Test reading ymm0..ymm15 (..ymm7 on i386) from coredump via XSTATE note.");
3556 
3557 /// ----------------------------------------------------------------------------
3558 
3559 #if defined(TWAIT_HAVE_STATUS)
3560 
3561 static void
3562 thread_concurrent_lwp_setup(pid_t child, lwpid_t lwpid)
3563 {
3564 	struct dbreg r;
3565 	union u dr7;
3566 
3567 	/* We need to set debug registers for every child */
3568 	DPRINTF("Call GETDBREGS for LWP %d\n", lwpid);
3569 	SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r, lwpid) != -1);
3570 
3571 	dr7.raw = 0;
3572 	/* should be set to 1 according to Intel manual, 17.2 */
3573 	dr7.bits.reserved_10 = 1;
3574 	dr7.bits.local_exact_breakpt = 1;
3575 	dr7.bits.global_exact_breakpt = 1;
3576 	/* use DR0 for breakpoints */
3577 	dr7.bits.global_dr0_breakpoint = 1;
3578 	dr7.bits.condition_dr0 = 0; /* exec */
3579 	dr7.bits.len_dr0 = 0;
3580 	/* use DR1 for watchpoints */
3581 	dr7.bits.global_dr1_breakpoint = 1;
3582 	dr7.bits.condition_dr1 = 1; /* write */
3583 	dr7.bits.len_dr1 = 3; /* 4 bytes */
3584 	r.dr[7] = dr7.raw;
3585 	r.dr[0] = (long)(intptr_t)check_happy;
3586 	r.dr[1] = (long)(intptr_t)&thread_concurrent_watchpoint_var;
3587 	DPRINTF("dr0=%" PRIxREGISTER "\n", r.dr[0]);
3588 	DPRINTF("dr1=%" PRIxREGISTER "\n", r.dr[1]);
3589 	DPRINTF("dr7=%" PRIxREGISTER "\n", r.dr[7]);
3590 
3591 	DPRINTF("Call SETDBREGS for LWP %d\n", lwpid);
3592 	SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r, lwpid) != -1);
3593 }
3594 
3595 static enum thread_concurrent_sigtrap_event
3596 thread_concurrent_handle_sigtrap(pid_t child, ptrace_siginfo_t *info)
3597 {
3598 	enum thread_concurrent_sigtrap_event ret = TCSE_UNKNOWN;
3599 	struct dbreg r;
3600 	union u dr7;
3601 
3602 	ATF_CHECK_EQ_MSG(info->psi_siginfo.si_code, TRAP_DBREG,
3603 	    "lwp=%d, expected TRAP_DBREG (%d), got %d", info->psi_lwpid,
3604 	    TRAP_DBREG, info->psi_siginfo.si_code);
3605 
3606 	DPRINTF("Call GETDBREGS for LWP %d\n", info->psi_lwpid);
3607 	SYSCALL_REQUIRE(ptrace(PT_GETDBREGS, child, &r, info->psi_lwpid) != -1);
3608 	DPRINTF("dr6=%" PRIxREGISTER ", dr7=%" PRIxREGISTER "\n",
3609 	    r.dr[6], r.dr[7]);
3610 
3611 	ATF_CHECK_MSG(r.dr[6] & 3, "lwp=%d, got DR6=%" PRIxREGISTER,
3612 	    info->psi_lwpid, r.dr[6]);
3613 
3614 	/* Handle only one event at a time, we should get
3615 	 * a separate SIGTRAP for the other one.
3616 	 */
3617 	if (r.dr[6] & 1) {
3618 		r.dr[6] &= ~1;
3619 
3620 		/* We need to disable the breakpoint to move
3621 		 * past it.
3622 		 *
3623 		 * TODO: single-step and reenable it?
3624 		 */
3625 		dr7.raw = r.dr[7];
3626 		dr7.bits.global_dr0_breakpoint = 0;
3627 		r.dr[7] = dr7.raw;
3628 
3629 		ret = TCSE_BREAKPOINT;
3630 	} else if (r.dr[6] & 2) {
3631 		r.dr[6] &= ~2;
3632 		ret = TCSE_WATCHPOINT;
3633 	}
3634 
3635 	DPRINTF("Call SETDBREGS for LWP %d\n", info->psi_lwpid);
3636 	DPRINTF("dr6=%" PRIxREGISTER ", dr7=%" PRIxREGISTER "\n",
3637 		r.dr[6], r.dr[7]);
3638 	SYSCALL_REQUIRE(ptrace(PT_SETDBREGS, child, &r, info->psi_lwpid) != -1);
3639 
3640 	return ret;
3641 }
3642 
3643 #endif /*defined(TWAIT_HAVE_STATUS)*/
3644 
3645 /// ----------------------------------------------------------------------------
3646 
3647 #define ATF_TP_ADD_TCS_PTRACE_WAIT_X86() \
3648 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_print); \
3649 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr0); \
3650 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr1); \
3651 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr2); \
3652 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr3); \
3653 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr0_yield); \
3654 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr1_yield); \
3655 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr2_yield); \
3656 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr3_yield); \
3657 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr0_continued); \
3658 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr1_continued); \
3659 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr2_continued); \
3660 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_preserve_dr3_continued); \
3661 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_writeonly_byte); \
3662 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_writeonly_byte); \
3663 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_writeonly_byte); \
3664 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_writeonly_byte); \
3665 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_writeonly_2bytes); \
3666 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_writeonly_2bytes); \
3667 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_writeonly_2bytes); \
3668 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_writeonly_2bytes); \
3669 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_writeonly_4bytes); \
3670 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_writeonly_4bytes); \
3671 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_writeonly_4bytes); \
3672 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_writeonly_4bytes); \
3673 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_write_byte); \
3674 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_write_byte); \
3675 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_write_byte); \
3676 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_write_byte); \
3677 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_write_2bytes); \
3678 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_write_2bytes); \
3679 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_write_2bytes); \
3680 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_write_2bytes); \
3681 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_write_4bytes); \
3682 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_write_4bytes); \
3683 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_write_4bytes); \
3684 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_write_4bytes); \
3685 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_read_byte); \
3686 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_read_byte); \
3687 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_read_byte); \
3688 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_read_byte); \
3689 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_read_2bytes); \
3690 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_read_2bytes); \
3691 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_read_2bytes); \
3692 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_read_2bytes); \
3693 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_variable_readwrite_read_4bytes); \
3694 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_variable_readwrite_read_4bytes); \
3695 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_variable_readwrite_read_4bytes); \
3696 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_variable_readwrite_read_4bytes); \
3697 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_trap_code); \
3698 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_trap_code); \
3699 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_trap_code); \
3700 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_trap_code); \
3701 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_dont_inherit_lwp); \
3702 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_dont_inherit_lwp); \
3703 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_dont_inherit_lwp); \
3704 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_dont_inherit_lwp); \
3705 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr0_dont_inherit_execve); \
3706 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr1_dont_inherit_execve); \
3707 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr2_dont_inherit_execve); \
3708 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, dbregs_dr3_dont_inherit_execve); \
3709 	ATF_TP_ADD_TC_HAVE_DBREGS(tp, x86_cve_2018_8897); \
3710 	ATF_TP_ADD_TC(tp, x86_gpregs32_read); \
3711 	ATF_TP_ADD_TC(tp, x86_gpregs32_write); \
3712 	ATF_TP_ADD_TC(tp, x86_gpregs32_core); \
3713 	ATF_TP_ADD_TC(tp, x86_gpregs32_ebp_esp_read); \
3714 	ATF_TP_ADD_TC(tp, x86_gpregs32_ebp_esp_write); \
3715 	ATF_TP_ADD_TC(tp, x86_gpregs32_ebp_esp_core); \
3716 	ATF_TP_ADD_TC(tp, x86_gpregs64_read); \
3717 	ATF_TP_ADD_TC(tp, x86_gpregs64_write); \
3718 	ATF_TP_ADD_TC(tp, x86_gpregs64_core); \
3719 	ATF_TP_ADD_TC(tp, x86_gpregs64_r8_read); \
3720 	ATF_TP_ADD_TC(tp, x86_gpregs64_r8_write); \
3721 	ATF_TP_ADD_TC(tp, x86_gpregs64_r8_core); \
3722 	ATF_TP_ADD_TC(tp, x86_fpregs_mm_read); \
3723 	ATF_TP_ADD_TC(tp, x86_fpregs_mm_write); \
3724 	ATF_TP_ADD_TC(tp, x86_fpregs_mm_core); \
3725 	ATF_TP_ADD_TC(tp, x86_fpregs_xmm_read); \
3726 	ATF_TP_ADD_TC(tp, x86_fpregs_xmm_write); \
3727 	ATF_TP_ADD_TC(tp, x86_fpregs_xmm_core); \
3728 	ATF_TP_ADD_TC(tp, x86_xstate_mm_read); \
3729 	ATF_TP_ADD_TC(tp, x86_xstate_mm_write); \
3730 	ATF_TP_ADD_TC(tp, x86_xstate_mm_core); \
3731 	ATF_TP_ADD_TC(tp, x86_xstate_xmm_read); \
3732 	ATF_TP_ADD_TC(tp, x86_xstate_xmm_write); \
3733 	ATF_TP_ADD_TC(tp, x86_xstate_xmm_core); \
3734 	ATF_TP_ADD_TC(tp, x86_xstate_ymm_read); \
3735 	ATF_TP_ADD_TC(tp, x86_xstate_ymm_write); \
3736 	ATF_TP_ADD_TC(tp, x86_xstate_ymm_core);
3737 #else
3738 #define ATF_TP_ADD_TCS_PTRACE_WAIT_X86()
3739 #endif
3740