/* Check that a fault signal handler gets the expected info */ #include <signal.h> #include <stdio.h> #include <stdlib.h> #include <fcntl.h> #include <setjmp.h> #include <unistd.h> #include "tests/asm.h" #include "tests/sys_mman.h" struct test { void (*test)(void); int sig; int code; volatile void *addr; }; static const struct test *cur_test; static jmp_buf escape; #define BADADDR ((int *)0x1234) #define FILESIZE (16*1024) #define MAPSIZE (2*FILESIZE) static char volatile *volatile mapping; static int testsig(int sig, int want) { if (sig != want) { fprintf(stderr, " FAIL: expected signal %d, not %d\n", want, sig); return 0; } return 1; } static int testcode(int code, int want) { if (code != want) { fprintf(stderr, " FAIL: expected si_code==%d, not %d\n", want, code); return 0; } return 1; } static int testaddr(void *addr, volatile void *want) { if (addr != want) { fprintf(stderr, " FAIL: expected si_addr==%p, not %p\n", want, addr); return 0; } return 1; } static void handler(int sig, siginfo_t *si, void *uc) { int ok = 1; ok = ok && testsig(sig, cur_test->sig); ok = ok && testcode(si->si_code, cur_test->code); if (cur_test->addr) ok = ok && testaddr(si->si_addr, cur_test->addr); if (ok) fprintf(stderr, " PASS\n"); siglongjmp(escape, ok + 1); } extern char test1_ill; static void test1() { asm volatile(VG_SYM(test1_ill) ": ud2"); } static void test2() { asm volatile ("int3"); } static void test3() { asm volatile ("int $0x10"); } static void test4() { volatile int a; asm volatile ("add $1, %0;"/* set OF */ "into" : "=a" (a) : "0" (0x7fffffff) : "cc"); } static void test5() { static int limit[2] = { 0, 10 }; asm volatile ("bound %0, %1" : : "r" (11), "m" (limit[0])); } int main() { int fd, i; static const int sigs[] = { SIGSEGV, SIGILL, SIGBUS, SIGFPE, SIGTRAP }; struct sigaction sa; sa.sa_sigaction = handler; sa.sa_flags = SA_SIGINFO; sigfillset(&sa.sa_mask); for(i = 0; i < sizeof(sigs)/sizeof(*sigs); i++) sigaction(sigs[i], &sa, NULL); fd = open("faultstatus.tmp", O_CREAT|O_TRUNC|O_EXCL, 0600); if (fd == -1) { perror("tmpfile"); exit(1); } unlink("faultstatus.tmp"); ftruncate(fd, FILESIZE); mapping = mmap(0, MAPSIZE, PROT_READ, MAP_PRIVATE, fd, 0); close(fd); { const struct test tests[] = { #define T(n, sig, code, addr) { test##n, sig, code, addr } T(1, SIGILL, ILL_ILLOPN, &test1_ill), T(2, SIGTRAP, 128, 0), /* TRAP_BRKPT? */ T(3, SIGSEGV, 128, 0), T(4, SIGSEGV, 128, 0), /* This is an expected failure - Valgrind doesn't implement the BOUND instruction, and so issues a SIGILL instead. */ T(5, SIGSEGV, 128, 0), #undef T }; for(i = 0; i < sizeof(tests)/sizeof(*tests); i++) { cur_test = &tests[i]; if (sigsetjmp(escape, 1) == 0) { fprintf(stderr, "Test %d: ", i+1); tests[i].test(); fprintf(stderr, " FAIL: no fault, or handler returned\n"); } } } return 0; }