162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only
262306a36Sopenharmony_ci/*
362306a36Sopenharmony_ci * entry_from_vm86.c - tests kernel entries from vm86 mode
462306a36Sopenharmony_ci * Copyright (c) 2014-2015 Andrew Lutomirski
562306a36Sopenharmony_ci *
662306a36Sopenharmony_ci * This exercises a few paths that need to special-case vm86 mode.
762306a36Sopenharmony_ci */
862306a36Sopenharmony_ci
962306a36Sopenharmony_ci#define _GNU_SOURCE
1062306a36Sopenharmony_ci
1162306a36Sopenharmony_ci#include <assert.h>
1262306a36Sopenharmony_ci#include <stdlib.h>
1362306a36Sopenharmony_ci#include <sys/syscall.h>
1462306a36Sopenharmony_ci#include <sys/signal.h>
1562306a36Sopenharmony_ci#include <sys/ucontext.h>
1662306a36Sopenharmony_ci#include <unistd.h>
1762306a36Sopenharmony_ci#include <stdio.h>
1862306a36Sopenharmony_ci#include <string.h>
1962306a36Sopenharmony_ci#include <inttypes.h>
2062306a36Sopenharmony_ci#include <sys/mman.h>
2162306a36Sopenharmony_ci#include <err.h>
2262306a36Sopenharmony_ci#include <stddef.h>
2362306a36Sopenharmony_ci#include <stdbool.h>
2462306a36Sopenharmony_ci#include <errno.h>
2562306a36Sopenharmony_ci#include <sys/vm86.h>
2662306a36Sopenharmony_ci
2762306a36Sopenharmony_cistatic unsigned long load_addr = 0x10000;
2862306a36Sopenharmony_cistatic int nerrs = 0;
2962306a36Sopenharmony_ci
3062306a36Sopenharmony_cistatic void sethandler(int sig, void (*handler)(int, siginfo_t *, void *),
3162306a36Sopenharmony_ci		       int flags)
3262306a36Sopenharmony_ci{
3362306a36Sopenharmony_ci	struct sigaction sa;
3462306a36Sopenharmony_ci	memset(&sa, 0, sizeof(sa));
3562306a36Sopenharmony_ci	sa.sa_sigaction = handler;
3662306a36Sopenharmony_ci	sa.sa_flags = SA_SIGINFO | flags;
3762306a36Sopenharmony_ci	sigemptyset(&sa.sa_mask);
3862306a36Sopenharmony_ci	if (sigaction(sig, &sa, 0))
3962306a36Sopenharmony_ci		err(1, "sigaction");
4062306a36Sopenharmony_ci}
4162306a36Sopenharmony_ci
4262306a36Sopenharmony_cistatic void clearhandler(int sig)
4362306a36Sopenharmony_ci{
4462306a36Sopenharmony_ci	struct sigaction sa;
4562306a36Sopenharmony_ci	memset(&sa, 0, sizeof(sa));
4662306a36Sopenharmony_ci	sa.sa_handler = SIG_DFL;
4762306a36Sopenharmony_ci	sigemptyset(&sa.sa_mask);
4862306a36Sopenharmony_ci	if (sigaction(sig, &sa, 0))
4962306a36Sopenharmony_ci		err(1, "sigaction");
5062306a36Sopenharmony_ci}
5162306a36Sopenharmony_ci
5262306a36Sopenharmony_cistatic sig_atomic_t got_signal;
5362306a36Sopenharmony_ci
5462306a36Sopenharmony_cistatic void sighandler(int sig, siginfo_t *info, void *ctx_void)
5562306a36Sopenharmony_ci{
5662306a36Sopenharmony_ci	ucontext_t *ctx = (ucontext_t*)ctx_void;
5762306a36Sopenharmony_ci
5862306a36Sopenharmony_ci	if (ctx->uc_mcontext.gregs[REG_EFL] & X86_EFLAGS_VM ||
5962306a36Sopenharmony_ci	    (ctx->uc_mcontext.gregs[REG_CS] & 3) != 3) {
6062306a36Sopenharmony_ci		printf("[FAIL]\tSignal frame should not reflect vm86 mode\n");
6162306a36Sopenharmony_ci		nerrs++;
6262306a36Sopenharmony_ci	}
6362306a36Sopenharmony_ci
6462306a36Sopenharmony_ci	const char *signame;
6562306a36Sopenharmony_ci	if (sig == SIGSEGV)
6662306a36Sopenharmony_ci		signame = "SIGSEGV";
6762306a36Sopenharmony_ci	else if (sig == SIGILL)
6862306a36Sopenharmony_ci		signame = "SIGILL";
6962306a36Sopenharmony_ci	else
7062306a36Sopenharmony_ci		signame = "unexpected signal";
7162306a36Sopenharmony_ci
7262306a36Sopenharmony_ci	printf("[INFO]\t%s: FLAGS = 0x%lx, CS = 0x%hx\n", signame,
7362306a36Sopenharmony_ci	       (unsigned long)ctx->uc_mcontext.gregs[REG_EFL],
7462306a36Sopenharmony_ci	       (unsigned short)ctx->uc_mcontext.gregs[REG_CS]);
7562306a36Sopenharmony_ci
7662306a36Sopenharmony_ci	got_signal = 1;
7762306a36Sopenharmony_ci}
7862306a36Sopenharmony_ci
7962306a36Sopenharmony_ciasm (
8062306a36Sopenharmony_ci	".pushsection .rodata\n\t"
8162306a36Sopenharmony_ci	".type vmcode_bound, @object\n\t"
8262306a36Sopenharmony_ci	"vmcode:\n\t"
8362306a36Sopenharmony_ci	"vmcode_bound:\n\t"
8462306a36Sopenharmony_ci	".code16\n\t"
8562306a36Sopenharmony_ci	"bound %ax, (2048)\n\t"
8662306a36Sopenharmony_ci	"int3\n\t"
8762306a36Sopenharmony_ci	"vmcode_sysenter:\n\t"
8862306a36Sopenharmony_ci	"sysenter\n\t"
8962306a36Sopenharmony_ci	"vmcode_syscall:\n\t"
9062306a36Sopenharmony_ci	"syscall\n\t"
9162306a36Sopenharmony_ci	"vmcode_sti:\n\t"
9262306a36Sopenharmony_ci	"sti\n\t"
9362306a36Sopenharmony_ci	"vmcode_int3:\n\t"
9462306a36Sopenharmony_ci	"int3\n\t"
9562306a36Sopenharmony_ci	"vmcode_int80:\n\t"
9662306a36Sopenharmony_ci	"int $0x80\n\t"
9762306a36Sopenharmony_ci	"vmcode_popf_hlt:\n\t"
9862306a36Sopenharmony_ci	"push %ax\n\t"
9962306a36Sopenharmony_ci	"popf\n\t"
10062306a36Sopenharmony_ci	"hlt\n\t"
10162306a36Sopenharmony_ci	"vmcode_umip:\n\t"
10262306a36Sopenharmony_ci	/* addressing via displacements */
10362306a36Sopenharmony_ci	"smsw (2052)\n\t"
10462306a36Sopenharmony_ci	"sidt (2054)\n\t"
10562306a36Sopenharmony_ci	"sgdt (2060)\n\t"
10662306a36Sopenharmony_ci	/* addressing via registers */
10762306a36Sopenharmony_ci	"mov $2066, %bx\n\t"
10862306a36Sopenharmony_ci	"smsw (%bx)\n\t"
10962306a36Sopenharmony_ci	"mov $2068, %bx\n\t"
11062306a36Sopenharmony_ci	"sidt (%bx)\n\t"
11162306a36Sopenharmony_ci	"mov $2074, %bx\n\t"
11262306a36Sopenharmony_ci	"sgdt (%bx)\n\t"
11362306a36Sopenharmony_ci	/* register operands, only for smsw */
11462306a36Sopenharmony_ci	"smsw %ax\n\t"
11562306a36Sopenharmony_ci	"mov %ax, (2080)\n\t"
11662306a36Sopenharmony_ci	"int3\n\t"
11762306a36Sopenharmony_ci	"vmcode_umip_str:\n\t"
11862306a36Sopenharmony_ci	"str %eax\n\t"
11962306a36Sopenharmony_ci	"vmcode_umip_sldt:\n\t"
12062306a36Sopenharmony_ci	"sldt %eax\n\t"
12162306a36Sopenharmony_ci	"int3\n\t"
12262306a36Sopenharmony_ci	".size vmcode, . - vmcode\n\t"
12362306a36Sopenharmony_ci	"end_vmcode:\n\t"
12462306a36Sopenharmony_ci	".code32\n\t"
12562306a36Sopenharmony_ci	".popsection"
12662306a36Sopenharmony_ci	);
12762306a36Sopenharmony_ci
12862306a36Sopenharmony_ciextern unsigned char vmcode[], end_vmcode[];
12962306a36Sopenharmony_ciextern unsigned char vmcode_bound[], vmcode_sysenter[], vmcode_syscall[],
13062306a36Sopenharmony_ci	vmcode_sti[], vmcode_int3[], vmcode_int80[], vmcode_popf_hlt[],
13162306a36Sopenharmony_ci	vmcode_umip[], vmcode_umip_str[], vmcode_umip_sldt[];
13262306a36Sopenharmony_ci
13362306a36Sopenharmony_ci/* Returns false if the test was skipped. */
13462306a36Sopenharmony_cistatic bool do_test(struct vm86plus_struct *v86, unsigned long eip,
13562306a36Sopenharmony_ci		    unsigned int rettype, unsigned int retarg,
13662306a36Sopenharmony_ci		    const char *text)
13762306a36Sopenharmony_ci{
13862306a36Sopenharmony_ci	long ret;
13962306a36Sopenharmony_ci
14062306a36Sopenharmony_ci	printf("[RUN]\t%s from vm86 mode\n", text);
14162306a36Sopenharmony_ci	v86->regs.eip = eip;
14262306a36Sopenharmony_ci	ret = vm86(VM86_ENTER, v86);
14362306a36Sopenharmony_ci
14462306a36Sopenharmony_ci	if (ret == -1 && (errno == ENOSYS || errno == EPERM)) {
14562306a36Sopenharmony_ci		printf("[SKIP]\tvm86 %s\n",
14662306a36Sopenharmony_ci		       errno == ENOSYS ? "not supported" : "not allowed");
14762306a36Sopenharmony_ci		return false;
14862306a36Sopenharmony_ci	}
14962306a36Sopenharmony_ci
15062306a36Sopenharmony_ci	if (VM86_TYPE(ret) == VM86_INTx) {
15162306a36Sopenharmony_ci		char trapname[32];
15262306a36Sopenharmony_ci		int trapno = VM86_ARG(ret);
15362306a36Sopenharmony_ci		if (trapno == 13)
15462306a36Sopenharmony_ci			strcpy(trapname, "GP");
15562306a36Sopenharmony_ci		else if (trapno == 5)
15662306a36Sopenharmony_ci			strcpy(trapname, "BR");
15762306a36Sopenharmony_ci		else if (trapno == 14)
15862306a36Sopenharmony_ci			strcpy(trapname, "PF");
15962306a36Sopenharmony_ci		else
16062306a36Sopenharmony_ci			sprintf(trapname, "%d", trapno);
16162306a36Sopenharmony_ci
16262306a36Sopenharmony_ci		printf("[INFO]\tExited vm86 mode due to #%s\n", trapname);
16362306a36Sopenharmony_ci	} else if (VM86_TYPE(ret) == VM86_UNKNOWN) {
16462306a36Sopenharmony_ci		printf("[INFO]\tExited vm86 mode due to unhandled GP fault\n");
16562306a36Sopenharmony_ci	} else if (VM86_TYPE(ret) == VM86_TRAP) {
16662306a36Sopenharmony_ci		printf("[INFO]\tExited vm86 mode due to a trap (arg=%ld)\n",
16762306a36Sopenharmony_ci		       VM86_ARG(ret));
16862306a36Sopenharmony_ci	} else if (VM86_TYPE(ret) == VM86_SIGNAL) {
16962306a36Sopenharmony_ci		printf("[INFO]\tExited vm86 mode due to a signal\n");
17062306a36Sopenharmony_ci	} else if (VM86_TYPE(ret) == VM86_STI) {
17162306a36Sopenharmony_ci		printf("[INFO]\tExited vm86 mode due to STI\n");
17262306a36Sopenharmony_ci	} else {
17362306a36Sopenharmony_ci		printf("[INFO]\tExited vm86 mode due to type %ld, arg %ld\n",
17462306a36Sopenharmony_ci		       VM86_TYPE(ret), VM86_ARG(ret));
17562306a36Sopenharmony_ci	}
17662306a36Sopenharmony_ci
17762306a36Sopenharmony_ci	if (rettype == -1 ||
17862306a36Sopenharmony_ci	    (VM86_TYPE(ret) == rettype && VM86_ARG(ret) == retarg)) {
17962306a36Sopenharmony_ci		printf("[OK]\tReturned correctly\n");
18062306a36Sopenharmony_ci	} else {
18162306a36Sopenharmony_ci		printf("[FAIL]\tIncorrect return reason (started at eip = 0x%lx, ended at eip = 0x%lx)\n", eip, v86->regs.eip);
18262306a36Sopenharmony_ci		nerrs++;
18362306a36Sopenharmony_ci	}
18462306a36Sopenharmony_ci
18562306a36Sopenharmony_ci	return true;
18662306a36Sopenharmony_ci}
18762306a36Sopenharmony_ci
18862306a36Sopenharmony_civoid do_umip_tests(struct vm86plus_struct *vm86, unsigned char *test_mem)
18962306a36Sopenharmony_ci{
19062306a36Sopenharmony_ci	struct table_desc {
19162306a36Sopenharmony_ci		unsigned short limit;
19262306a36Sopenharmony_ci		unsigned long base;
19362306a36Sopenharmony_ci	} __attribute__((packed));
19462306a36Sopenharmony_ci
19562306a36Sopenharmony_ci	/* Initialize variables with arbitrary values */
19662306a36Sopenharmony_ci	struct table_desc gdt1 = { .base = 0x3c3c3c3c, .limit = 0x9999 };
19762306a36Sopenharmony_ci	struct table_desc gdt2 = { .base = 0x1a1a1a1a, .limit = 0xaeae };
19862306a36Sopenharmony_ci	struct table_desc idt1 = { .base = 0x7b7b7b7b, .limit = 0xf1f1 };
19962306a36Sopenharmony_ci	struct table_desc idt2 = { .base = 0x89898989, .limit = 0x1313 };
20062306a36Sopenharmony_ci	unsigned short msw1 = 0x1414, msw2 = 0x2525, msw3 = 3737;
20162306a36Sopenharmony_ci
20262306a36Sopenharmony_ci	/* UMIP -- exit with INT3 unless kernel emulation did not trap #GP */
20362306a36Sopenharmony_ci	do_test(vm86, vmcode_umip - vmcode, VM86_TRAP, 3, "UMIP tests");
20462306a36Sopenharmony_ci
20562306a36Sopenharmony_ci	/* Results from displacement-only addressing */
20662306a36Sopenharmony_ci	msw1 = *(unsigned short *)(test_mem + 2052);
20762306a36Sopenharmony_ci	memcpy(&idt1, test_mem + 2054, sizeof(idt1));
20862306a36Sopenharmony_ci	memcpy(&gdt1, test_mem + 2060, sizeof(gdt1));
20962306a36Sopenharmony_ci
21062306a36Sopenharmony_ci	/* Results from register-indirect addressing */
21162306a36Sopenharmony_ci	msw2 = *(unsigned short *)(test_mem + 2066);
21262306a36Sopenharmony_ci	memcpy(&idt2, test_mem + 2068, sizeof(idt2));
21362306a36Sopenharmony_ci	memcpy(&gdt2, test_mem + 2074, sizeof(gdt2));
21462306a36Sopenharmony_ci
21562306a36Sopenharmony_ci	/* Results when using register operands */
21662306a36Sopenharmony_ci	msw3 = *(unsigned short *)(test_mem + 2080);
21762306a36Sopenharmony_ci
21862306a36Sopenharmony_ci	printf("[INFO]\tResult from SMSW:[0x%04x]\n", msw1);
21962306a36Sopenharmony_ci	printf("[INFO]\tResult from SIDT: limit[0x%04x]base[0x%08lx]\n",
22062306a36Sopenharmony_ci	       idt1.limit, idt1.base);
22162306a36Sopenharmony_ci	printf("[INFO]\tResult from SGDT: limit[0x%04x]base[0x%08lx]\n",
22262306a36Sopenharmony_ci	       gdt1.limit, gdt1.base);
22362306a36Sopenharmony_ci
22462306a36Sopenharmony_ci	if (msw1 != msw2 || msw1 != msw3)
22562306a36Sopenharmony_ci		printf("[FAIL]\tAll the results of SMSW should be the same.\n");
22662306a36Sopenharmony_ci	else
22762306a36Sopenharmony_ci		printf("[PASS]\tAll the results from SMSW are identical.\n");
22862306a36Sopenharmony_ci
22962306a36Sopenharmony_ci	if (memcmp(&gdt1, &gdt2, sizeof(gdt1)))
23062306a36Sopenharmony_ci		printf("[FAIL]\tAll the results of SGDT should be the same.\n");
23162306a36Sopenharmony_ci	else
23262306a36Sopenharmony_ci		printf("[PASS]\tAll the results from SGDT are identical.\n");
23362306a36Sopenharmony_ci
23462306a36Sopenharmony_ci	if (memcmp(&idt1, &idt2, sizeof(idt1)))
23562306a36Sopenharmony_ci		printf("[FAIL]\tAll the results of SIDT should be the same.\n");
23662306a36Sopenharmony_ci	else
23762306a36Sopenharmony_ci		printf("[PASS]\tAll the results from SIDT are identical.\n");
23862306a36Sopenharmony_ci
23962306a36Sopenharmony_ci	sethandler(SIGILL, sighandler, 0);
24062306a36Sopenharmony_ci	do_test(vm86, vmcode_umip_str - vmcode, VM86_SIGNAL, 0,
24162306a36Sopenharmony_ci		"STR instruction");
24262306a36Sopenharmony_ci	clearhandler(SIGILL);
24362306a36Sopenharmony_ci
24462306a36Sopenharmony_ci	sethandler(SIGILL, sighandler, 0);
24562306a36Sopenharmony_ci	do_test(vm86, vmcode_umip_sldt - vmcode, VM86_SIGNAL, 0,
24662306a36Sopenharmony_ci		"SLDT instruction");
24762306a36Sopenharmony_ci	clearhandler(SIGILL);
24862306a36Sopenharmony_ci}
24962306a36Sopenharmony_ci
25062306a36Sopenharmony_ciint main(void)
25162306a36Sopenharmony_ci{
25262306a36Sopenharmony_ci	struct vm86plus_struct v86;
25362306a36Sopenharmony_ci	unsigned char *addr = mmap((void *)load_addr, 4096,
25462306a36Sopenharmony_ci				   PROT_READ | PROT_WRITE | PROT_EXEC,
25562306a36Sopenharmony_ci				   MAP_ANONYMOUS | MAP_PRIVATE, -1,0);
25662306a36Sopenharmony_ci	if (addr != (unsigned char *)load_addr)
25762306a36Sopenharmony_ci		err(1, "mmap");
25862306a36Sopenharmony_ci
25962306a36Sopenharmony_ci	memcpy(addr, vmcode, end_vmcode - vmcode);
26062306a36Sopenharmony_ci	addr[2048] = 2;
26162306a36Sopenharmony_ci	addr[2050] = 3;
26262306a36Sopenharmony_ci
26362306a36Sopenharmony_ci	memset(&v86, 0, sizeof(v86));
26462306a36Sopenharmony_ci
26562306a36Sopenharmony_ci	v86.regs.cs = load_addr / 16;
26662306a36Sopenharmony_ci	v86.regs.ss = load_addr / 16;
26762306a36Sopenharmony_ci	v86.regs.ds = load_addr / 16;
26862306a36Sopenharmony_ci	v86.regs.es = load_addr / 16;
26962306a36Sopenharmony_ci
27062306a36Sopenharmony_ci	/* Use the end of the page as our stack. */
27162306a36Sopenharmony_ci	v86.regs.esp = 4096;
27262306a36Sopenharmony_ci
27362306a36Sopenharmony_ci	assert((v86.regs.cs & 3) == 0);	/* Looks like RPL = 0 */
27462306a36Sopenharmony_ci
27562306a36Sopenharmony_ci	/* #BR -- should deliver SIG??? */
27662306a36Sopenharmony_ci	do_test(&v86, vmcode_bound - vmcode, VM86_INTx, 5, "#BR");
27762306a36Sopenharmony_ci
27862306a36Sopenharmony_ci	/*
27962306a36Sopenharmony_ci	 * SYSENTER -- should cause #GP or #UD depending on CPU.
28062306a36Sopenharmony_ci	 * Expected return type -1 means that we shouldn't validate
28162306a36Sopenharmony_ci	 * the vm86 return value.  This will avoid problems on non-SEP
28262306a36Sopenharmony_ci	 * CPUs.
28362306a36Sopenharmony_ci	 */
28462306a36Sopenharmony_ci	sethandler(SIGILL, sighandler, 0);
28562306a36Sopenharmony_ci	do_test(&v86, vmcode_sysenter - vmcode, -1, 0, "SYSENTER");
28662306a36Sopenharmony_ci	clearhandler(SIGILL);
28762306a36Sopenharmony_ci
28862306a36Sopenharmony_ci	/*
28962306a36Sopenharmony_ci	 * SYSCALL would be a disaster in VM86 mode.  Fortunately,
29062306a36Sopenharmony_ci	 * there is no kernel that both enables SYSCALL and sets
29162306a36Sopenharmony_ci	 * EFER.SCE, so it's #UD on all systems.  But vm86 is
29262306a36Sopenharmony_ci	 * buggy (or has a "feature"), so the SIGILL will actually
29362306a36Sopenharmony_ci	 * be delivered.
29462306a36Sopenharmony_ci	 */
29562306a36Sopenharmony_ci	sethandler(SIGILL, sighandler, 0);
29662306a36Sopenharmony_ci	do_test(&v86, vmcode_syscall - vmcode, VM86_SIGNAL, 0, "SYSCALL");
29762306a36Sopenharmony_ci	clearhandler(SIGILL);
29862306a36Sopenharmony_ci
29962306a36Sopenharmony_ci	/* STI with VIP set */
30062306a36Sopenharmony_ci	v86.regs.eflags |= X86_EFLAGS_VIP;
30162306a36Sopenharmony_ci	v86.regs.eflags &= ~X86_EFLAGS_IF;
30262306a36Sopenharmony_ci	do_test(&v86, vmcode_sti - vmcode, VM86_STI, 0, "STI with VIP set");
30362306a36Sopenharmony_ci
30462306a36Sopenharmony_ci	/* POPF with VIP set but IF clear: should not trap */
30562306a36Sopenharmony_ci	v86.regs.eflags = X86_EFLAGS_VIP;
30662306a36Sopenharmony_ci	v86.regs.eax = 0;
30762306a36Sopenharmony_ci	do_test(&v86, vmcode_popf_hlt - vmcode, VM86_UNKNOWN, 0, "POPF with VIP set and IF clear");
30862306a36Sopenharmony_ci
30962306a36Sopenharmony_ci	/* POPF with VIP set and IF set: should trap */
31062306a36Sopenharmony_ci	v86.regs.eflags = X86_EFLAGS_VIP;
31162306a36Sopenharmony_ci	v86.regs.eax = X86_EFLAGS_IF;
31262306a36Sopenharmony_ci	do_test(&v86, vmcode_popf_hlt - vmcode, VM86_STI, 0, "POPF with VIP and IF set");
31362306a36Sopenharmony_ci
31462306a36Sopenharmony_ci	/* POPF with VIP clear and IF set: should not trap */
31562306a36Sopenharmony_ci	v86.regs.eflags = 0;
31662306a36Sopenharmony_ci	v86.regs.eax = X86_EFLAGS_IF;
31762306a36Sopenharmony_ci	do_test(&v86, vmcode_popf_hlt - vmcode, VM86_UNKNOWN, 0, "POPF with VIP clear and IF set");
31862306a36Sopenharmony_ci
31962306a36Sopenharmony_ci	v86.regs.eflags = 0;
32062306a36Sopenharmony_ci
32162306a36Sopenharmony_ci	/* INT3 -- should cause #BP */
32262306a36Sopenharmony_ci	do_test(&v86, vmcode_int3 - vmcode, VM86_TRAP, 3, "INT3");
32362306a36Sopenharmony_ci
32462306a36Sopenharmony_ci	/* INT80 -- should exit with "INTx 0x80" */
32562306a36Sopenharmony_ci	v86.regs.eax = (unsigned int)-1;
32662306a36Sopenharmony_ci	do_test(&v86, vmcode_int80 - vmcode, VM86_INTx, 0x80, "int80");
32762306a36Sopenharmony_ci
32862306a36Sopenharmony_ci	/* UMIP -- should exit with INTx 0x80 unless UMIP was not disabled */
32962306a36Sopenharmony_ci	do_umip_tests(&v86, addr);
33062306a36Sopenharmony_ci
33162306a36Sopenharmony_ci	/* Execute a null pointer */
33262306a36Sopenharmony_ci	v86.regs.cs = 0;
33362306a36Sopenharmony_ci	v86.regs.ss = 0;
33462306a36Sopenharmony_ci	sethandler(SIGSEGV, sighandler, 0);
33562306a36Sopenharmony_ci	got_signal = 0;
33662306a36Sopenharmony_ci	if (do_test(&v86, 0, VM86_SIGNAL, 0, "Execute null pointer") &&
33762306a36Sopenharmony_ci	    !got_signal) {
33862306a36Sopenharmony_ci		printf("[FAIL]\tDid not receive SIGSEGV\n");
33962306a36Sopenharmony_ci		nerrs++;
34062306a36Sopenharmony_ci	}
34162306a36Sopenharmony_ci	clearhandler(SIGSEGV);
34262306a36Sopenharmony_ci
34362306a36Sopenharmony_ci	/* Make sure nothing explodes if we fork. */
34462306a36Sopenharmony_ci	if (fork() == 0)
34562306a36Sopenharmony_ci		return 0;
34662306a36Sopenharmony_ci
34762306a36Sopenharmony_ci	return (nerrs == 0 ? 0 : 1);
34862306a36Sopenharmony_ci}
349