xref: /OK3568_Linux_fs/kernel/tools/testing/selftests/x86/ptrace_syscall.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0
2*4882a593Smuzhiyun #define _GNU_SOURCE
3*4882a593Smuzhiyun 
4*4882a593Smuzhiyun #include <sys/ptrace.h>
5*4882a593Smuzhiyun #include <sys/types.h>
6*4882a593Smuzhiyun #include <sys/wait.h>
7*4882a593Smuzhiyun #include <sys/syscall.h>
8*4882a593Smuzhiyun #include <sys/user.h>
9*4882a593Smuzhiyun #include <unistd.h>
10*4882a593Smuzhiyun #include <errno.h>
11*4882a593Smuzhiyun #include <stddef.h>
12*4882a593Smuzhiyun #include <stdio.h>
13*4882a593Smuzhiyun #include <err.h>
14*4882a593Smuzhiyun #include <string.h>
15*4882a593Smuzhiyun #include <asm/ptrace-abi.h>
16*4882a593Smuzhiyun #include <sys/auxv.h>
17*4882a593Smuzhiyun 
18*4882a593Smuzhiyun /* Bitness-agnostic defines for user_regs_struct fields. */
19*4882a593Smuzhiyun #ifdef __x86_64__
20*4882a593Smuzhiyun # define user_syscall_nr	orig_rax
21*4882a593Smuzhiyun # define user_arg0		rdi
22*4882a593Smuzhiyun # define user_arg1		rsi
23*4882a593Smuzhiyun # define user_arg2		rdx
24*4882a593Smuzhiyun # define user_arg3		r10
25*4882a593Smuzhiyun # define user_arg4		r8
26*4882a593Smuzhiyun # define user_arg5		r9
27*4882a593Smuzhiyun # define user_ip		rip
28*4882a593Smuzhiyun # define user_ax		rax
29*4882a593Smuzhiyun #else
30*4882a593Smuzhiyun # define user_syscall_nr	orig_eax
31*4882a593Smuzhiyun # define user_arg0		ebx
32*4882a593Smuzhiyun # define user_arg1		ecx
33*4882a593Smuzhiyun # define user_arg2		edx
34*4882a593Smuzhiyun # define user_arg3		esi
35*4882a593Smuzhiyun # define user_arg4		edi
36*4882a593Smuzhiyun # define user_arg5		ebp
37*4882a593Smuzhiyun # define user_ip		eip
38*4882a593Smuzhiyun # define user_ax		eax
39*4882a593Smuzhiyun #endif
40*4882a593Smuzhiyun 
41*4882a593Smuzhiyun static int nerrs = 0;
42*4882a593Smuzhiyun 
43*4882a593Smuzhiyun struct syscall_args32 {
44*4882a593Smuzhiyun 	uint32_t nr, arg0, arg1, arg2, arg3, arg4, arg5;
45*4882a593Smuzhiyun };
46*4882a593Smuzhiyun 
47*4882a593Smuzhiyun #ifdef __i386__
48*4882a593Smuzhiyun extern void sys32_helper(struct syscall_args32 *, void *);
49*4882a593Smuzhiyun extern void int80_and_ret(void);
50*4882a593Smuzhiyun #endif
51*4882a593Smuzhiyun 
52*4882a593Smuzhiyun /*
53*4882a593Smuzhiyun  * Helper to invoke int80 with controlled regs and capture the final regs.
54*4882a593Smuzhiyun  */
do_full_int80(struct syscall_args32 * args)55*4882a593Smuzhiyun static void do_full_int80(struct syscall_args32 *args)
56*4882a593Smuzhiyun {
57*4882a593Smuzhiyun #ifdef __x86_64__
58*4882a593Smuzhiyun 	register unsigned long bp asm("bp") = args->arg5;
59*4882a593Smuzhiyun 	asm volatile ("int $0x80"
60*4882a593Smuzhiyun 		      : "+a" (args->nr),
61*4882a593Smuzhiyun 			"+b" (args->arg0), "+c" (args->arg1), "+d" (args->arg2),
62*4882a593Smuzhiyun 			"+S" (args->arg3), "+D" (args->arg4), "+r" (bp)
63*4882a593Smuzhiyun 			: : "r8", "r9", "r10", "r11");
64*4882a593Smuzhiyun 	args->arg5 = bp;
65*4882a593Smuzhiyun #else
66*4882a593Smuzhiyun 	sys32_helper(args, int80_and_ret);
67*4882a593Smuzhiyun #endif
68*4882a593Smuzhiyun }
69*4882a593Smuzhiyun 
70*4882a593Smuzhiyun #ifdef __i386__
71*4882a593Smuzhiyun static void (*vsyscall32)(void);
72*4882a593Smuzhiyun 
73*4882a593Smuzhiyun /*
74*4882a593Smuzhiyun  * Nasty helper to invoke AT_SYSINFO (i.e. __kernel_vsyscall) with
75*4882a593Smuzhiyun  * controlled regs and capture the final regs.  This is so nasty that it
76*4882a593Smuzhiyun  * crashes my copy of gdb :)
77*4882a593Smuzhiyun  */
do_full_vsyscall32(struct syscall_args32 * args)78*4882a593Smuzhiyun static void do_full_vsyscall32(struct syscall_args32 *args)
79*4882a593Smuzhiyun {
80*4882a593Smuzhiyun 	sys32_helper(args, vsyscall32);
81*4882a593Smuzhiyun }
82*4882a593Smuzhiyun #endif
83*4882a593Smuzhiyun 
wait_trap(pid_t chld)84*4882a593Smuzhiyun static siginfo_t wait_trap(pid_t chld)
85*4882a593Smuzhiyun {
86*4882a593Smuzhiyun 	siginfo_t si;
87*4882a593Smuzhiyun 	if (waitid(P_PID, chld, &si, WEXITED|WSTOPPED) != 0)
88*4882a593Smuzhiyun 		err(1, "waitid");
89*4882a593Smuzhiyun 	if (si.si_pid != chld)
90*4882a593Smuzhiyun 		errx(1, "got unexpected pid in event\n");
91*4882a593Smuzhiyun 	if (si.si_code != CLD_TRAPPED)
92*4882a593Smuzhiyun 		errx(1, "got unexpected event type %d\n", si.si_code);
93*4882a593Smuzhiyun 	return si;
94*4882a593Smuzhiyun }
95*4882a593Smuzhiyun 
sethandler(int sig,void (* handler)(int,siginfo_t *,void *),int flags)96*4882a593Smuzhiyun static void sethandler(int sig, void (*handler)(int, siginfo_t *, void *),
97*4882a593Smuzhiyun 		       int flags)
98*4882a593Smuzhiyun {
99*4882a593Smuzhiyun 	struct sigaction sa;
100*4882a593Smuzhiyun 	memset(&sa, 0, sizeof(sa));
101*4882a593Smuzhiyun 	sa.sa_sigaction = handler;
102*4882a593Smuzhiyun 	sa.sa_flags = SA_SIGINFO | flags;
103*4882a593Smuzhiyun 	sigemptyset(&sa.sa_mask);
104*4882a593Smuzhiyun 	if (sigaction(sig, &sa, 0))
105*4882a593Smuzhiyun 		err(1, "sigaction");
106*4882a593Smuzhiyun }
107*4882a593Smuzhiyun 
setsigign(int sig,int flags)108*4882a593Smuzhiyun static void setsigign(int sig, int flags)
109*4882a593Smuzhiyun {
110*4882a593Smuzhiyun 	struct sigaction sa;
111*4882a593Smuzhiyun 	memset(&sa, 0, sizeof(sa));
112*4882a593Smuzhiyun 	sa.sa_sigaction = (void *)SIG_IGN;
113*4882a593Smuzhiyun 	sa.sa_flags = flags;
114*4882a593Smuzhiyun 	sigemptyset(&sa.sa_mask);
115*4882a593Smuzhiyun 	if (sigaction(sig, &sa, 0))
116*4882a593Smuzhiyun 		err(1, "sigaction");
117*4882a593Smuzhiyun }
118*4882a593Smuzhiyun 
clearhandler(int sig)119*4882a593Smuzhiyun static void clearhandler(int sig)
120*4882a593Smuzhiyun {
121*4882a593Smuzhiyun 	struct sigaction sa;
122*4882a593Smuzhiyun 	memset(&sa, 0, sizeof(sa));
123*4882a593Smuzhiyun 	sa.sa_handler = SIG_DFL;
124*4882a593Smuzhiyun 	sigemptyset(&sa.sa_mask);
125*4882a593Smuzhiyun 	if (sigaction(sig, &sa, 0))
126*4882a593Smuzhiyun 		err(1, "sigaction");
127*4882a593Smuzhiyun }
128*4882a593Smuzhiyun 
129*4882a593Smuzhiyun #ifdef __x86_64__
130*4882a593Smuzhiyun # define REG_BP REG_RBP
131*4882a593Smuzhiyun #else
132*4882a593Smuzhiyun # define REG_BP REG_EBP
133*4882a593Smuzhiyun #endif
134*4882a593Smuzhiyun 
empty_handler(int sig,siginfo_t * si,void * ctx_void)135*4882a593Smuzhiyun static void empty_handler(int sig, siginfo_t *si, void *ctx_void)
136*4882a593Smuzhiyun {
137*4882a593Smuzhiyun }
138*4882a593Smuzhiyun 
test_sys32_regs(void (* do_syscall)(struct syscall_args32 *))139*4882a593Smuzhiyun static void test_sys32_regs(void (*do_syscall)(struct syscall_args32 *))
140*4882a593Smuzhiyun {
141*4882a593Smuzhiyun 	struct syscall_args32 args = {
142*4882a593Smuzhiyun 		.nr = 224,	/* gettid */
143*4882a593Smuzhiyun 		.arg0 = 10, .arg1 = 11, .arg2 = 12,
144*4882a593Smuzhiyun 		.arg3 = 13, .arg4 = 14, .arg5 = 15,
145*4882a593Smuzhiyun 	};
146*4882a593Smuzhiyun 
147*4882a593Smuzhiyun 	do_syscall(&args);
148*4882a593Smuzhiyun 
149*4882a593Smuzhiyun 	if (args.nr != getpid() ||
150*4882a593Smuzhiyun 	    args.arg0 != 10 || args.arg1 != 11 || args.arg2 != 12 ||
151*4882a593Smuzhiyun 	    args.arg3 != 13 || args.arg4 != 14 || args.arg5 != 15) {
152*4882a593Smuzhiyun 		printf("[FAIL]\tgetpid() failed to preserve regs\n");
153*4882a593Smuzhiyun 		nerrs++;
154*4882a593Smuzhiyun 	} else {
155*4882a593Smuzhiyun 		printf("[OK]\tgetpid() preserves regs\n");
156*4882a593Smuzhiyun 	}
157*4882a593Smuzhiyun 
158*4882a593Smuzhiyun 	sethandler(SIGUSR1, empty_handler, 0);
159*4882a593Smuzhiyun 
160*4882a593Smuzhiyun 	args.nr = 37;	/* kill */
161*4882a593Smuzhiyun 	args.arg0 = getpid();
162*4882a593Smuzhiyun 	args.arg1 = SIGUSR1;
163*4882a593Smuzhiyun 	do_syscall(&args);
164*4882a593Smuzhiyun 	if (args.nr != 0 ||
165*4882a593Smuzhiyun 	    args.arg0 != getpid() || args.arg1 != SIGUSR1 || args.arg2 != 12 ||
166*4882a593Smuzhiyun 	    args.arg3 != 13 || args.arg4 != 14 || args.arg5 != 15) {
167*4882a593Smuzhiyun 		printf("[FAIL]\tkill(getpid(), SIGUSR1) failed to preserve regs\n");
168*4882a593Smuzhiyun 		nerrs++;
169*4882a593Smuzhiyun 	} else {
170*4882a593Smuzhiyun 		printf("[OK]\tkill(getpid(), SIGUSR1) preserves regs\n");
171*4882a593Smuzhiyun 	}
172*4882a593Smuzhiyun 	clearhandler(SIGUSR1);
173*4882a593Smuzhiyun }
174*4882a593Smuzhiyun 
test_ptrace_syscall_restart(void)175*4882a593Smuzhiyun static void test_ptrace_syscall_restart(void)
176*4882a593Smuzhiyun {
177*4882a593Smuzhiyun 	printf("[RUN]\tptrace-induced syscall restart\n");
178*4882a593Smuzhiyun 	pid_t chld = fork();
179*4882a593Smuzhiyun 	if (chld < 0)
180*4882a593Smuzhiyun 		err(1, "fork");
181*4882a593Smuzhiyun 
182*4882a593Smuzhiyun 	if (chld == 0) {
183*4882a593Smuzhiyun 		if (ptrace(PTRACE_TRACEME, 0, 0, 0) != 0)
184*4882a593Smuzhiyun 			err(1, "PTRACE_TRACEME");
185*4882a593Smuzhiyun 
186*4882a593Smuzhiyun 		pid_t pid = getpid(), tid = syscall(SYS_gettid);
187*4882a593Smuzhiyun 
188*4882a593Smuzhiyun 		printf("\tChild will make one syscall\n");
189*4882a593Smuzhiyun 		syscall(SYS_tgkill, pid, tid, SIGSTOP);
190*4882a593Smuzhiyun 
191*4882a593Smuzhiyun 		syscall(SYS_gettid, 10, 11, 12, 13, 14, 15);
192*4882a593Smuzhiyun 		_exit(0);
193*4882a593Smuzhiyun 	}
194*4882a593Smuzhiyun 
195*4882a593Smuzhiyun 	int status;
196*4882a593Smuzhiyun 
197*4882a593Smuzhiyun 	/* Wait for SIGSTOP. */
198*4882a593Smuzhiyun 	if (waitpid(chld, &status, 0) != chld || !WIFSTOPPED(status))
199*4882a593Smuzhiyun 		err(1, "waitpid");
200*4882a593Smuzhiyun 
201*4882a593Smuzhiyun 	struct user_regs_struct regs;
202*4882a593Smuzhiyun 
203*4882a593Smuzhiyun 	printf("[RUN]\tSYSEMU\n");
204*4882a593Smuzhiyun 	if (ptrace(PTRACE_SYSEMU, chld, 0, 0) != 0)
205*4882a593Smuzhiyun 		err(1, "PTRACE_SYSEMU");
206*4882a593Smuzhiyun 	wait_trap(chld);
207*4882a593Smuzhiyun 
208*4882a593Smuzhiyun 	if (ptrace(PTRACE_GETREGS, chld, 0, &regs) != 0)
209*4882a593Smuzhiyun 		err(1, "PTRACE_GETREGS");
210*4882a593Smuzhiyun 
211*4882a593Smuzhiyun 	if (regs.user_syscall_nr != SYS_gettid ||
212*4882a593Smuzhiyun 	    regs.user_arg0 != 10 || regs.user_arg1 != 11 ||
213*4882a593Smuzhiyun 	    regs.user_arg2 != 12 || regs.user_arg3 != 13 ||
214*4882a593Smuzhiyun 	    regs.user_arg4 != 14 || regs.user_arg5 != 15) {
215*4882a593Smuzhiyun 		printf("[FAIL]\tInitial args are wrong (nr=%lu, args=%lu %lu %lu %lu %lu %lu)\n", (unsigned long)regs.user_syscall_nr, (unsigned long)regs.user_arg0, (unsigned long)regs.user_arg1, (unsigned long)regs.user_arg2, (unsigned long)regs.user_arg3, (unsigned long)regs.user_arg4, (unsigned long)regs.user_arg5);
216*4882a593Smuzhiyun 		nerrs++;
217*4882a593Smuzhiyun 	} else {
218*4882a593Smuzhiyun 		printf("[OK]\tInitial nr and args are correct\n");
219*4882a593Smuzhiyun 	}
220*4882a593Smuzhiyun 
221*4882a593Smuzhiyun 	printf("[RUN]\tRestart the syscall (ip = 0x%lx)\n",
222*4882a593Smuzhiyun 	       (unsigned long)regs.user_ip);
223*4882a593Smuzhiyun 
224*4882a593Smuzhiyun 	/*
225*4882a593Smuzhiyun 	 * This does exactly what it appears to do if syscall is int80 or
226*4882a593Smuzhiyun 	 * SYSCALL64.  For SYSCALL32 or SYSENTER, though, this is highly
227*4882a593Smuzhiyun 	 * magical.  It needs to work so that ptrace and syscall restart
228*4882a593Smuzhiyun 	 * work as expected.
229*4882a593Smuzhiyun 	 */
230*4882a593Smuzhiyun 	regs.user_ax = regs.user_syscall_nr;
231*4882a593Smuzhiyun 	regs.user_ip -= 2;
232*4882a593Smuzhiyun 	if (ptrace(PTRACE_SETREGS, chld, 0, &regs) != 0)
233*4882a593Smuzhiyun 		err(1, "PTRACE_SETREGS");
234*4882a593Smuzhiyun 
235*4882a593Smuzhiyun 	if (ptrace(PTRACE_SYSEMU, chld, 0, 0) != 0)
236*4882a593Smuzhiyun 		err(1, "PTRACE_SYSEMU");
237*4882a593Smuzhiyun 	wait_trap(chld);
238*4882a593Smuzhiyun 
239*4882a593Smuzhiyun 	if (ptrace(PTRACE_GETREGS, chld, 0, &regs) != 0)
240*4882a593Smuzhiyun 		err(1, "PTRACE_GETREGS");
241*4882a593Smuzhiyun 
242*4882a593Smuzhiyun 	if (regs.user_syscall_nr != SYS_gettid ||
243*4882a593Smuzhiyun 	    regs.user_arg0 != 10 || regs.user_arg1 != 11 ||
244*4882a593Smuzhiyun 	    regs.user_arg2 != 12 || regs.user_arg3 != 13 ||
245*4882a593Smuzhiyun 	    regs.user_arg4 != 14 || regs.user_arg5 != 15) {
246*4882a593Smuzhiyun 		printf("[FAIL]\tRestart nr or args are wrong (nr=%lu, args=%lu %lu %lu %lu %lu %lu)\n", (unsigned long)regs.user_syscall_nr, (unsigned long)regs.user_arg0, (unsigned long)regs.user_arg1, (unsigned long)regs.user_arg2, (unsigned long)regs.user_arg3, (unsigned long)regs.user_arg4, (unsigned long)regs.user_arg5);
247*4882a593Smuzhiyun 		nerrs++;
248*4882a593Smuzhiyun 	} else {
249*4882a593Smuzhiyun 		printf("[OK]\tRestarted nr and args are correct\n");
250*4882a593Smuzhiyun 	}
251*4882a593Smuzhiyun 
252*4882a593Smuzhiyun 	printf("[RUN]\tChange nr and args and restart the syscall (ip = 0x%lx)\n",
253*4882a593Smuzhiyun 	       (unsigned long)regs.user_ip);
254*4882a593Smuzhiyun 
255*4882a593Smuzhiyun 	regs.user_ax = SYS_getpid;
256*4882a593Smuzhiyun 	regs.user_arg0 = 20;
257*4882a593Smuzhiyun 	regs.user_arg1 = 21;
258*4882a593Smuzhiyun 	regs.user_arg2 = 22;
259*4882a593Smuzhiyun 	regs.user_arg3 = 23;
260*4882a593Smuzhiyun 	regs.user_arg4 = 24;
261*4882a593Smuzhiyun 	regs.user_arg5 = 25;
262*4882a593Smuzhiyun 	regs.user_ip -= 2;
263*4882a593Smuzhiyun 
264*4882a593Smuzhiyun 	if (ptrace(PTRACE_SETREGS, chld, 0, &regs) != 0)
265*4882a593Smuzhiyun 		err(1, "PTRACE_SETREGS");
266*4882a593Smuzhiyun 
267*4882a593Smuzhiyun 	if (ptrace(PTRACE_SYSEMU, chld, 0, 0) != 0)
268*4882a593Smuzhiyun 		err(1, "PTRACE_SYSEMU");
269*4882a593Smuzhiyun 	wait_trap(chld);
270*4882a593Smuzhiyun 
271*4882a593Smuzhiyun 	if (ptrace(PTRACE_GETREGS, chld, 0, &regs) != 0)
272*4882a593Smuzhiyun 		err(1, "PTRACE_GETREGS");
273*4882a593Smuzhiyun 
274*4882a593Smuzhiyun 	if (regs.user_syscall_nr != SYS_getpid ||
275*4882a593Smuzhiyun 	    regs.user_arg0 != 20 || regs.user_arg1 != 21 || regs.user_arg2 != 22 ||
276*4882a593Smuzhiyun 	    regs.user_arg3 != 23 || regs.user_arg4 != 24 || regs.user_arg5 != 25) {
277*4882a593Smuzhiyun 		printf("[FAIL]\tRestart nr or args are wrong (nr=%lu, args=%lu %lu %lu %lu %lu %lu)\n", (unsigned long)regs.user_syscall_nr, (unsigned long)regs.user_arg0, (unsigned long)regs.user_arg1, (unsigned long)regs.user_arg2, (unsigned long)regs.user_arg3, (unsigned long)regs.user_arg4, (unsigned long)regs.user_arg5);
278*4882a593Smuzhiyun 		nerrs++;
279*4882a593Smuzhiyun 	} else {
280*4882a593Smuzhiyun 		printf("[OK]\tReplacement nr and args are correct\n");
281*4882a593Smuzhiyun 	}
282*4882a593Smuzhiyun 
283*4882a593Smuzhiyun 	if (ptrace(PTRACE_CONT, chld, 0, 0) != 0)
284*4882a593Smuzhiyun 		err(1, "PTRACE_CONT");
285*4882a593Smuzhiyun 	if (waitpid(chld, &status, 0) != chld)
286*4882a593Smuzhiyun 		err(1, "waitpid");
287*4882a593Smuzhiyun 	if (!WIFEXITED(status) || WEXITSTATUS(status) != 0) {
288*4882a593Smuzhiyun 		printf("[FAIL]\tChild failed\n");
289*4882a593Smuzhiyun 		nerrs++;
290*4882a593Smuzhiyun 	} else {
291*4882a593Smuzhiyun 		printf("[OK]\tChild exited cleanly\n");
292*4882a593Smuzhiyun 	}
293*4882a593Smuzhiyun }
294*4882a593Smuzhiyun 
test_restart_under_ptrace(void)295*4882a593Smuzhiyun static void test_restart_under_ptrace(void)
296*4882a593Smuzhiyun {
297*4882a593Smuzhiyun 	printf("[RUN]\tkernel syscall restart under ptrace\n");
298*4882a593Smuzhiyun 	pid_t chld = fork();
299*4882a593Smuzhiyun 	if (chld < 0)
300*4882a593Smuzhiyun 		err(1, "fork");
301*4882a593Smuzhiyun 
302*4882a593Smuzhiyun 	if (chld == 0) {
303*4882a593Smuzhiyun 		if (ptrace(PTRACE_TRACEME, 0, 0, 0) != 0)
304*4882a593Smuzhiyun 			err(1, "PTRACE_TRACEME");
305*4882a593Smuzhiyun 
306*4882a593Smuzhiyun 		pid_t pid = getpid(), tid = syscall(SYS_gettid);
307*4882a593Smuzhiyun 
308*4882a593Smuzhiyun 		printf("\tChild will take a nap until signaled\n");
309*4882a593Smuzhiyun 		setsigign(SIGUSR1, SA_RESTART);
310*4882a593Smuzhiyun 		syscall(SYS_tgkill, pid, tid, SIGSTOP);
311*4882a593Smuzhiyun 
312*4882a593Smuzhiyun 		syscall(SYS_pause, 0, 0, 0, 0, 0, 0);
313*4882a593Smuzhiyun 		_exit(0);
314*4882a593Smuzhiyun 	}
315*4882a593Smuzhiyun 
316*4882a593Smuzhiyun 	int status;
317*4882a593Smuzhiyun 
318*4882a593Smuzhiyun 	/* Wait for SIGSTOP. */
319*4882a593Smuzhiyun 	if (waitpid(chld, &status, 0) != chld || !WIFSTOPPED(status))
320*4882a593Smuzhiyun 		err(1, "waitpid");
321*4882a593Smuzhiyun 
322*4882a593Smuzhiyun 	struct user_regs_struct regs;
323*4882a593Smuzhiyun 
324*4882a593Smuzhiyun 	printf("[RUN]\tSYSCALL\n");
325*4882a593Smuzhiyun 	if (ptrace(PTRACE_SYSCALL, chld, 0, 0) != 0)
326*4882a593Smuzhiyun 		err(1, "PTRACE_SYSCALL");
327*4882a593Smuzhiyun 	wait_trap(chld);
328*4882a593Smuzhiyun 
329*4882a593Smuzhiyun 	/* We should be stopped at pause(2) entry. */
330*4882a593Smuzhiyun 
331*4882a593Smuzhiyun 	if (ptrace(PTRACE_GETREGS, chld, 0, &regs) != 0)
332*4882a593Smuzhiyun 		err(1, "PTRACE_GETREGS");
333*4882a593Smuzhiyun 
334*4882a593Smuzhiyun 	if (regs.user_syscall_nr != SYS_pause ||
335*4882a593Smuzhiyun 	    regs.user_arg0 != 0 || regs.user_arg1 != 0 ||
336*4882a593Smuzhiyun 	    regs.user_arg2 != 0 || regs.user_arg3 != 0 ||
337*4882a593Smuzhiyun 	    regs.user_arg4 != 0 || regs.user_arg5 != 0) {
338*4882a593Smuzhiyun 		printf("[FAIL]\tInitial args are wrong (nr=%lu, args=%lu %lu %lu %lu %lu %lu)\n", (unsigned long)regs.user_syscall_nr, (unsigned long)regs.user_arg0, (unsigned long)regs.user_arg1, (unsigned long)regs.user_arg2, (unsigned long)regs.user_arg3, (unsigned long)regs.user_arg4, (unsigned long)regs.user_arg5);
339*4882a593Smuzhiyun 		nerrs++;
340*4882a593Smuzhiyun 	} else {
341*4882a593Smuzhiyun 		printf("[OK]\tInitial nr and args are correct\n");
342*4882a593Smuzhiyun 	}
343*4882a593Smuzhiyun 
344*4882a593Smuzhiyun 	/* Interrupt it. */
345*4882a593Smuzhiyun 	kill(chld, SIGUSR1);
346*4882a593Smuzhiyun 
347*4882a593Smuzhiyun 	/* Advance.  We should be stopped at exit. */
348*4882a593Smuzhiyun 	printf("[RUN]\tSYSCALL\n");
349*4882a593Smuzhiyun 	if (ptrace(PTRACE_SYSCALL, chld, 0, 0) != 0)
350*4882a593Smuzhiyun 		err(1, "PTRACE_SYSCALL");
351*4882a593Smuzhiyun 	wait_trap(chld);
352*4882a593Smuzhiyun 
353*4882a593Smuzhiyun 	if (ptrace(PTRACE_GETREGS, chld, 0, &regs) != 0)
354*4882a593Smuzhiyun 		err(1, "PTRACE_GETREGS");
355*4882a593Smuzhiyun 
356*4882a593Smuzhiyun 	if (regs.user_syscall_nr != SYS_pause ||
357*4882a593Smuzhiyun 	    regs.user_arg0 != 0 || regs.user_arg1 != 0 ||
358*4882a593Smuzhiyun 	    regs.user_arg2 != 0 || regs.user_arg3 != 0 ||
359*4882a593Smuzhiyun 	    regs.user_arg4 != 0 || regs.user_arg5 != 0) {
360*4882a593Smuzhiyun 		printf("[FAIL]\tArgs after SIGUSR1 are wrong (nr=%lu, args=%lu %lu %lu %lu %lu %lu)\n", (unsigned long)regs.user_syscall_nr, (unsigned long)regs.user_arg0, (unsigned long)regs.user_arg1, (unsigned long)regs.user_arg2, (unsigned long)regs.user_arg3, (unsigned long)regs.user_arg4, (unsigned long)regs.user_arg5);
361*4882a593Smuzhiyun 		nerrs++;
362*4882a593Smuzhiyun 	} else {
363*4882a593Smuzhiyun 		printf("[OK]\tArgs after SIGUSR1 are correct (ax = %ld)\n",
364*4882a593Smuzhiyun 		       (long)regs.user_ax);
365*4882a593Smuzhiyun 	}
366*4882a593Smuzhiyun 
367*4882a593Smuzhiyun 	/* Poke the regs back in.  This must not break anything. */
368*4882a593Smuzhiyun 	if (ptrace(PTRACE_SETREGS, chld, 0, &regs) != 0)
369*4882a593Smuzhiyun 		err(1, "PTRACE_SETREGS");
370*4882a593Smuzhiyun 
371*4882a593Smuzhiyun 	/* Catch the (ignored) SIGUSR1. */
372*4882a593Smuzhiyun 	if (ptrace(PTRACE_CONT, chld, 0, 0) != 0)
373*4882a593Smuzhiyun 		err(1, "PTRACE_CONT");
374*4882a593Smuzhiyun 	if (waitpid(chld, &status, 0) != chld)
375*4882a593Smuzhiyun 		err(1, "waitpid");
376*4882a593Smuzhiyun 	if (!WIFSTOPPED(status)) {
377*4882a593Smuzhiyun 		printf("[FAIL]\tChild was stopped for SIGUSR1 (status = 0x%x)\n", status);
378*4882a593Smuzhiyun 		nerrs++;
379*4882a593Smuzhiyun 	} else {
380*4882a593Smuzhiyun 		printf("[OK]\tChild got SIGUSR1\n");
381*4882a593Smuzhiyun 	}
382*4882a593Smuzhiyun 
383*4882a593Smuzhiyun 	/* The next event should be pause(2) again. */
384*4882a593Smuzhiyun 	printf("[RUN]\tStep again\n");
385*4882a593Smuzhiyun 	if (ptrace(PTRACE_SYSCALL, chld, 0, 0) != 0)
386*4882a593Smuzhiyun 		err(1, "PTRACE_SYSCALL");
387*4882a593Smuzhiyun 	wait_trap(chld);
388*4882a593Smuzhiyun 
389*4882a593Smuzhiyun 	/* We should be stopped at pause(2) entry. */
390*4882a593Smuzhiyun 
391*4882a593Smuzhiyun 	if (ptrace(PTRACE_GETREGS, chld, 0, &regs) != 0)
392*4882a593Smuzhiyun 		err(1, "PTRACE_GETREGS");
393*4882a593Smuzhiyun 
394*4882a593Smuzhiyun 	if (regs.user_syscall_nr != SYS_pause ||
395*4882a593Smuzhiyun 	    regs.user_arg0 != 0 || regs.user_arg1 != 0 ||
396*4882a593Smuzhiyun 	    regs.user_arg2 != 0 || regs.user_arg3 != 0 ||
397*4882a593Smuzhiyun 	    regs.user_arg4 != 0 || regs.user_arg5 != 0) {
398*4882a593Smuzhiyun 		printf("[FAIL]\tpause did not restart (nr=%lu, args=%lu %lu %lu %lu %lu %lu)\n", (unsigned long)regs.user_syscall_nr, (unsigned long)regs.user_arg0, (unsigned long)regs.user_arg1, (unsigned long)regs.user_arg2, (unsigned long)regs.user_arg3, (unsigned long)regs.user_arg4, (unsigned long)regs.user_arg5);
399*4882a593Smuzhiyun 		nerrs++;
400*4882a593Smuzhiyun 	} else {
401*4882a593Smuzhiyun 		printf("[OK]\tpause(2) restarted correctly\n");
402*4882a593Smuzhiyun 	}
403*4882a593Smuzhiyun 
404*4882a593Smuzhiyun 	/* Kill it. */
405*4882a593Smuzhiyun 	kill(chld, SIGKILL);
406*4882a593Smuzhiyun 	if (waitpid(chld, &status, 0) != chld)
407*4882a593Smuzhiyun 		err(1, "waitpid");
408*4882a593Smuzhiyun }
409*4882a593Smuzhiyun 
main()410*4882a593Smuzhiyun int main()
411*4882a593Smuzhiyun {
412*4882a593Smuzhiyun 	printf("[RUN]\tCheck int80 return regs\n");
413*4882a593Smuzhiyun 	test_sys32_regs(do_full_int80);
414*4882a593Smuzhiyun 
415*4882a593Smuzhiyun #if defined(__i386__) && (!defined(__GLIBC__) || __GLIBC__ > 2 || __GLIBC_MINOR__ >= 16)
416*4882a593Smuzhiyun 	vsyscall32 = (void *)getauxval(AT_SYSINFO);
417*4882a593Smuzhiyun 	if (vsyscall32) {
418*4882a593Smuzhiyun 		printf("[RUN]\tCheck AT_SYSINFO return regs\n");
419*4882a593Smuzhiyun 		test_sys32_regs(do_full_vsyscall32);
420*4882a593Smuzhiyun 	} else {
421*4882a593Smuzhiyun 		printf("[SKIP]\tAT_SYSINFO is not available\n");
422*4882a593Smuzhiyun 	}
423*4882a593Smuzhiyun #endif
424*4882a593Smuzhiyun 
425*4882a593Smuzhiyun 	test_ptrace_syscall_restart();
426*4882a593Smuzhiyun 
427*4882a593Smuzhiyun 	test_restart_under_ptrace();
428*4882a593Smuzhiyun 
429*4882a593Smuzhiyun 	return 0;
430*4882a593Smuzhiyun }
431