NetBSD/src kTbgQ24tests/kernel t_trapsignal.sh h_segv.c

   Extend ATF tests in t_trapsignal.sh to verify software breakpoint traps

   There are at least four types of SIGTRAP events:
    - software/hardware single step (trace trap)
    - software breakpoint
    - hardware breakpoint/watchpoint
    - kernel event (exec, fork, vfork, vfork-done, lwp-create, lwp-exit)

   A program can execute software breakpoint without the context of being
   traced and this is a regular crash signal emitting SIGTRAP (TRAP_BRKPT).

   Rename original trap_* tests (trap_simple, trap_handle, trap_mask,
   trap_handle_recurse and trap_ignore) to segv_* tests and restrict them for
   SIGSEGV.

   Add new tests: trap_* testing the same scenarios as segv_ ones, however
   verifying the software breakpoint trap (SIGTRAP).

   Keep the original name of h_segv.c, and extend it for software breakpoint
   events.

   The purpose of these tests is to verify SIGTRAP kernel paths without the
   ptrace(2) context.

   All tests pass.

   Sponsored by <The NetBSD Foundation>
VersionDeltaFile
1.3+92-18tests/kernel/t_trapsignal.sh
1.4+46-11tests/kernel/h_segv.c
+138-292 files

UnifiedSplitRaw