diff options
| author | Josh Gao <jmgao@google.com> | 2017-10-18 11:44:51 -0700 |
|---|---|---|
| committer | Josh Gao <jmgao@google.com> | 2017-11-15 15:38:13 -0800 |
| commit | ef35aa5d40b6404baf702a58527f1cd3a9f42f19 (patch) | |
| tree | 99f7797b05c934a10fdcb058b025a0304ca2b6f5 | |
| parent | 29c5378e91720b7befabc91fbab0f25d59a23bf1 (diff) | |
| download | system_core-ef35aa5d40b6404baf702a58527f1cd3a9f42f19.tar.gz system_core-ef35aa5d40b6404baf702a58527f1cd3a9f42f19.tar.bz2 system_core-ef35aa5d40b6404baf702a58527f1cd3a9f42f19.zip | |
unwindstack: rename Memory::Read to ReadFully.
Rename Memory::Read to ReadFully to match its semantics with that of
android::base. ReadPartially will be renamed to Read in a follow up
commit, kept intentionally separate so that there aren't any callers
accidentally switched from ReadFully to Read.
Test: treehugger
Change-Id: I7d845ac5244c3025d92c8512e960e5d0d1da05af
| -rw-r--r-- | libunwindstack/DwarfMemory.cpp | 2 | ||||
| -rw-r--r-- | libunwindstack/DwarfOp.cpp | 4 | ||||
| -rw-r--r-- | libunwindstack/DwarfSection.cpp | 7 | ||||
| -rw-r--r-- | libunwindstack/Elf.cpp | 10 | ||||
| -rw-r--r-- | libunwindstack/ElfInterface.cpp | 10 | ||||
| -rw-r--r-- | libunwindstack/Memory.cpp | 6 | ||||
| -rw-r--r-- | libunwindstack/Regs.cpp | 35 | ||||
| -rw-r--r-- | libunwindstack/Symbols.cpp | 2 | ||||
| -rw-r--r-- | libunwindstack/include/unwindstack/Memory.h | 12 | ||||
| -rw-r--r-- | libunwindstack/tests/MapInfoCreateMemoryTest.cpp | 20 | ||||
| -rw-r--r-- | libunwindstack/tests/MapInfoGetElfTest.cpp | 16 | ||||
| -rw-r--r-- | libunwindstack/tests/MemoryBufferTest.cpp | 16 | ||||
| -rw-r--r-- | libunwindstack/tests/MemoryFileTest.cpp | 45 | ||||
| -rw-r--r-- | libunwindstack/tests/MemoryLocalTest.cpp | 10 | ||||
| -rw-r--r-- | libunwindstack/tests/MemoryRangeTest.cpp | 14 | ||||
| -rw-r--r-- | libunwindstack/tests/MemoryRemoteTest.cpp | 24 | ||||
| -rw-r--r-- | libunwindstack/tests/UnwindTest.cpp | 2 |
17 files changed, 122 insertions, 113 deletions
diff --git a/libunwindstack/DwarfMemory.cpp b/libunwindstack/DwarfMemory.cpp index 901f49285..6ffdc0de1 100644 --- a/libunwindstack/DwarfMemory.cpp +++ b/libunwindstack/DwarfMemory.cpp @@ -27,7 +27,7 @@ namespace unwindstack { bool DwarfMemory::ReadBytes(void* dst, size_t num_bytes) { - if (!memory_->Read(cur_offset_, dst, num_bytes)) { + if (!memory_->ReadFully(cur_offset_, dst, num_bytes)) { return false; } cur_offset_ += num_bytes; diff --git a/libunwindstack/DwarfOp.cpp b/libunwindstack/DwarfOp.cpp index b3fd0df91..3b3d340f4 100644 --- a/libunwindstack/DwarfOp.cpp +++ b/libunwindstack/DwarfOp.cpp @@ -141,7 +141,7 @@ bool DwarfOp<AddressType>::op_deref() { // Read the address and dereference it. AddressType addr = StackPop(); AddressType value; - if (!regular_memory()->Read(addr, &value, sizeof(value))) { + if (!regular_memory()->ReadFully(addr, &value, sizeof(value))) { last_error_ = DWARF_ERROR_MEMORY_INVALID; return false; } @@ -159,7 +159,7 @@ bool DwarfOp<AddressType>::op_deref_size() { // Read the address and dereference it. AddressType addr = StackPop(); AddressType value = 0; - if (!regular_memory()->Read(addr, &value, bytes_to_read)) { + if (!regular_memory()->ReadFully(addr, &value, bytes_to_read)) { last_error_ = DWARF_ERROR_MEMORY_INVALID; return false; } diff --git a/libunwindstack/DwarfSection.cpp b/libunwindstack/DwarfSection.cpp index 805dcd34b..095418726 100644 --- a/libunwindstack/DwarfSection.cpp +++ b/libunwindstack/DwarfSection.cpp @@ -142,7 +142,7 @@ bool DwarfSectionImpl<AddressType>::Eval(const DwarfCie* cie, Memory* regular_me return false; } if (loc->type == DWARF_LOCATION_EXPRESSION) { - if (!regular_memory->Read(value, &cfa, sizeof(AddressType))) { + if (!regular_memory->ReadFully(value, &cfa, sizeof(AddressType))) { last_error_ = DWARF_ERROR_MEMORY_INVALID; return false; } @@ -175,7 +175,8 @@ bool DwarfSectionImpl<AddressType>::Eval(const DwarfCie* cie, Memory* regular_me const DwarfLocation* loc = &entry.second; switch (loc->type) { case DWARF_LOCATION_OFFSET: - if (!regular_memory->Read(cfa + loc->values[0], &(*cur_regs)[reg], sizeof(AddressType))) { + if (!regular_memory->ReadFully(cfa + loc->values[0], &(*cur_regs)[reg], + sizeof(AddressType))) { last_error_ = DWARF_ERROR_MEMORY_INVALID; return false; } @@ -210,7 +211,7 @@ bool DwarfSectionImpl<AddressType>::Eval(const DwarfCie* cie, Memory* regular_me return false; } if (loc->type == DWARF_LOCATION_EXPRESSION) { - if (!regular_memory->Read(value, &(*cur_regs)[reg], sizeof(AddressType))) { + if (!regular_memory->ReadFully(value, &(*cur_regs)[reg], sizeof(AddressType))) { last_error_ = DWARF_ERROR_MEMORY_INVALID; return false; } diff --git a/libunwindstack/Elf.cpp b/libunwindstack/Elf.cpp index edf7ac2d7..1be402eae 100644 --- a/libunwindstack/Elf.cpp +++ b/libunwindstack/Elf.cpp @@ -131,7 +131,7 @@ bool Elf::IsValidElf(Memory* memory) { // Verify that this is a valid elf file. uint8_t e_ident[SELFMAG + 1]; - if (!memory->Read(0, e_ident, SELFMAG)) { + if (!memory->ReadFully(0, e_ident, SELFMAG)) { return false; } @@ -151,7 +151,7 @@ void Elf::GetInfo(Memory* memory, bool* valid, uint64_t* size) { // Now read the section header information. uint8_t class_type; - if (!memory->Read(EI_CLASS, &class_type, 1)) { + if (!memory->ReadFully(EI_CLASS, &class_type, 1)) { return; } if (class_type == ELFCLASS32) { @@ -169,12 +169,12 @@ ElfInterface* Elf::CreateInterfaceFromMemory(Memory* memory) { } std::unique_ptr<ElfInterface> interface; - if (!memory->Read(EI_CLASS, &class_type_, 1)) { + if (!memory->ReadFully(EI_CLASS, &class_type_, 1)) { return nullptr; } if (class_type_ == ELFCLASS32) { Elf32_Half e_machine; - if (!memory->Read(EI_NIDENT + sizeof(Elf32_Half), &e_machine, sizeof(e_machine))) { + if (!memory->ReadFully(EI_NIDENT + sizeof(Elf32_Half), &e_machine, sizeof(e_machine))) { return nullptr; } @@ -195,7 +195,7 @@ ElfInterface* Elf::CreateInterfaceFromMemory(Memory* memory) { } } else if (class_type_ == ELFCLASS64) { Elf64_Half e_machine; - if (!memory->Read(EI_NIDENT + sizeof(Elf64_Half), &e_machine, sizeof(e_machine))) { + if (!memory->ReadFully(EI_NIDENT + sizeof(Elf64_Half), &e_machine, sizeof(e_machine))) { return nullptr; } if (e_machine != EM_AARCH64 && e_machine != EM_X86_64) { diff --git a/libunwindstack/ElfInterface.cpp b/libunwindstack/ElfInterface.cpp index d5d158f82..9bdb09402 100644 --- a/libunwindstack/ElfInterface.cpp +++ b/libunwindstack/ElfInterface.cpp @@ -53,7 +53,7 @@ Memory* ElfInterface::CreateGnuDebugdataMemory() { Crc64GenerateTable(); std::vector<uint8_t> src(gnu_debugdata_size_); - if (!memory_->Read(gnu_debugdata_offset_, src.data(), gnu_debugdata_size_)) { + if (!memory_->ReadFully(gnu_debugdata_offset_, src.data(), gnu_debugdata_size_)) { gnu_debugdata_offset_ = 0; gnu_debugdata_size_ = static_cast<uint64_t>(-1); return nullptr; @@ -131,7 +131,7 @@ void ElfInterface::InitHeadersWithTemplate() { template <typename EhdrType, typename PhdrType, typename ShdrType> bool ElfInterface::ReadAllHeaders(uint64_t* load_bias) { EhdrType ehdr; - if (!memory_->Read(0, &ehdr, sizeof(ehdr))) { + if (!memory_->ReadFully(0, &ehdr, sizeof(ehdr))) { return false; } @@ -242,7 +242,7 @@ bool ElfInterface::ReadSectionHeaders(const EhdrType& ehdr) { } if (shdr.sh_type == SHT_SYMTAB || shdr.sh_type == SHT_DYNSYM) { - if (!memory_->Read(offset, &shdr, sizeof(shdr))) { + if (!memory_->ReadFully(offset, &shdr, sizeof(shdr))) { return false; } // Need to go get the information about the section that contains @@ -324,7 +324,7 @@ bool ElfInterface::GetSonameWithTemplate(std::string* soname) { uint64_t offset = dynamic_offset_; uint64_t max_offset = offset + dynamic_size_; for (uint64_t offset = dynamic_offset_; offset < max_offset; offset += sizeof(DynType)) { - if (!memory_->Read(offset, &dyn, sizeof(dyn))) { + if (!memory_->ReadFully(offset, &dyn, sizeof(dyn))) { return false; } @@ -388,7 +388,7 @@ bool ElfInterface::Step(uint64_t pc, Regs* regs, Memory* process_memory, bool* f template <typename EhdrType> void ElfInterface::GetMaxSizeWithTemplate(Memory* memory, uint64_t* size) { EhdrType ehdr; - if (!memory->Read(0, &ehdr, sizeof(ehdr))) { + if (!memory->ReadFully(0, &ehdr, sizeof(ehdr))) { return; } if (ehdr.e_shnum == 0) { diff --git a/libunwindstack/Memory.cpp b/libunwindstack/Memory.cpp index f27a350d4..1f4cd03ef 100644 --- a/libunwindstack/Memory.cpp +++ b/libunwindstack/Memory.cpp @@ -84,7 +84,7 @@ static size_t ProcessVmRead(pid_t pid, void* dst, uint64_t remote_src, size_t le namespace unwindstack { -bool Memory::Read(uint64_t addr, void* dst, size_t size) { +bool Memory::ReadFully(uint64_t addr, void* dst, size_t size) { size_t rc = ReadPartially(addr, dst, size); return rc == size; } @@ -94,7 +94,7 @@ bool Memory::ReadString(uint64_t addr, std::string* string, uint64_t max_read) { uint64_t bytes_read = 0; while (bytes_read < max_read) { uint8_t value; - if (!Read(addr, &value, sizeof(value))) { + if (!ReadFully(addr, &value, sizeof(value))) { return false; } if (value == '\0') { @@ -237,7 +237,7 @@ bool MemoryOffline::Init(const std::string& file, uint64_t offset) { // The first uint64_t value is the start of memory. uint64_t start; - if (!memory_file->Read(0, &start, sizeof(start))) { + if (!memory_file->ReadFully(0, &start, sizeof(start))) { return false; } diff --git a/libunwindstack/Regs.cpp b/libunwindstack/Regs.cpp index 36b8e25f5..28a77dc16 100644 --- a/libunwindstack/Regs.cpp +++ b/libunwindstack/Regs.cpp @@ -58,7 +58,7 @@ uint64_t RegsArm::GetAdjustedPc(uint64_t rel_pc, Elf* elf) { if (adjusted_rel_pc & 1) { // This is a thumb instruction, it could be 2 or 4 bytes. uint32_t value; - if (rel_pc < 5 || !elf->memory()->Read(adjusted_rel_pc - 5, &value, sizeof(value)) || + if (rel_pc < 5 || !elf->memory()->ReadFully(adjusted_rel_pc - 5, &value, sizeof(value)) || (value & 0xe000f000) != 0xe000f000) { return rel_pc - 2; } @@ -193,7 +193,7 @@ void RegsX86::SetFromRaw() { bool RegsX86::SetPcFromReturnAddress(Memory* process_memory) { // Attempt to get the return address from the top of the stack. uint32_t new_pc; - if (!process_memory->Read(sp_, &new_pc, sizeof(new_pc)) || new_pc == pc()) { + if (!process_memory->ReadFully(sp_, &new_pc, sizeof(new_pc)) || new_pc == pc()) { return false; } @@ -240,7 +240,7 @@ void RegsX86_64::SetFromRaw() { bool RegsX86_64::SetPcFromReturnAddress(Memory* process_memory) { // Attempt to get the return address from the top of the stack. uint64_t new_pc; - if (!process_memory->Read(sp_, &new_pc, sizeof(new_pc)) || new_pc == pc()) { + if (!process_memory->ReadFully(sp_, &new_pc, sizeof(new_pc)) || new_pc == pc()) { return false; } @@ -474,7 +474,7 @@ bool RegsArm::StepIfSignalHandler(uint64_t rel_pc, Elf* elf, Memory* process_mem Memory* elf_memory = elf->memory(); // Read from elf memory since it is usually more expensive to read from // process memory. - if (!elf_memory->Read(rel_pc, &data, sizeof(data))) { + if (!elf_memory->ReadFully(rel_pc, &data, sizeof(data))) { return false; } @@ -493,7 +493,7 @@ bool RegsArm::StepIfSignalHandler(uint64_t rel_pc, Elf* elf, Memory* process_mem // Form 3 (thumb): // 0x77 0x27 movs r7, #77 // 0x00 0xdf svc 0 - if (!process_memory->Read(sp(), &data, sizeof(data))) { + if (!process_memory->ReadFully(sp(), &data, sizeof(data))) { return false; } if (data == 0x5ac3c35a) { @@ -517,7 +517,7 @@ bool RegsArm::StepIfSignalHandler(uint64_t rel_pc, Elf* elf, Memory* process_mem // Form 3 (thumb): // 0xad 0x27 movs r7, #ad // 0x00 0xdf svc 0 - if (!process_memory->Read(sp(), &data, sizeof(data))) { + if (!process_memory->ReadFully(sp(), &data, sizeof(data))) { return false; } if (data == sp() + 8) { @@ -532,7 +532,7 @@ bool RegsArm::StepIfSignalHandler(uint64_t rel_pc, Elf* elf, Memory* process_mem return false; } - if (!process_memory->Read(offset, regs_.data(), sizeof(uint32_t) * ARM_REG_LAST)) { + if (!process_memory->ReadFully(offset, regs_.data(), sizeof(uint32_t) * ARM_REG_LAST)) { return false; } SetFromRaw(); @@ -544,7 +544,7 @@ bool RegsArm64::StepIfSignalHandler(uint64_t rel_pc, Elf* elf, Memory* process_m Memory* elf_memory = elf->memory(); // Read from elf memory since it is usually more expensive to read from // process memory. - if (!elf_memory->Read(rel_pc, &data, sizeof(data))) { + if (!elf_memory->ReadFully(rel_pc, &data, sizeof(data))) { return false; } @@ -557,8 +557,8 @@ bool RegsArm64::StepIfSignalHandler(uint64_t rel_pc, Elf* elf, Memory* process_m } // SP + sizeof(siginfo_t) + uc_mcontext offset + X0 offset. - if (!process_memory->Read(sp() + 0x80 + 0xb0 + 0x08, regs_.data(), - sizeof(uint64_t) * ARM64_REG_LAST)) { + if (!process_memory->ReadFully(sp() + 0x80 + 0xb0 + 0x08, regs_.data(), + sizeof(uint64_t) * ARM64_REG_LAST)) { return false; } @@ -571,7 +571,7 @@ bool RegsX86::StepIfSignalHandler(uint64_t rel_pc, Elf* elf, Memory* process_mem Memory* elf_memory = elf->memory(); // Read from elf memory since it is usually more expensive to read from // process memory. - if (!elf_memory->Read(rel_pc, &data, sizeof(data))) { + if (!elf_memory->ReadFully(rel_pc, &data, sizeof(data))) { return false; } @@ -587,7 +587,7 @@ bool RegsX86::StepIfSignalHandler(uint64_t rel_pc, Elf* elf, Memory* process_mem // int signum // struct sigcontext (same format as mcontext) struct x86_mcontext_t context; - if (!process_memory->Read(sp() + 4, &context, sizeof(context))) { + if (!process_memory->ReadFully(sp() + 4, &context, sizeof(context))) { return false; } regs_[X86_REG_EBP] = context.ebp; @@ -613,12 +613,12 @@ bool RegsX86::StepIfSignalHandler(uint64_t rel_pc, Elf* elf, Memory* process_mem // Get the location of the sigcontext data. uint32_t ptr; - if (!process_memory->Read(sp() + 8, &ptr, sizeof(ptr))) { + if (!process_memory->ReadFully(sp() + 8, &ptr, sizeof(ptr))) { return false; } // Only read the portion of the data structure we care about. x86_ucontext_t x86_ucontext; - if (!process_memory->Read(ptr + 0x14, &x86_ucontext.uc_mcontext, sizeof(x86_mcontext_t))) { + if (!process_memory->ReadFully(ptr + 0x14, &x86_ucontext.uc_mcontext, sizeof(x86_mcontext_t))) { return false; } SetFromUcontext(&x86_ucontext); @@ -632,12 +632,12 @@ bool RegsX86_64::StepIfSignalHandler(uint64_t rel_pc, Elf* elf, Memory* process_ Memory* elf_memory = elf->memory(); // Read from elf memory since it is usually more expensive to read from // process memory. - if (!elf_memory->Read(rel_pc, &data, sizeof(data)) || data != 0x0f0000000fc0c748) { + if (!elf_memory->ReadFully(rel_pc, &data, sizeof(data)) || data != 0x0f0000000fc0c748) { return false; } uint16_t data2; - if (!elf_memory->Read(rel_pc + 8, &data2, sizeof(data2)) || data2 != 0x0f05) { + if (!elf_memory->ReadFully(rel_pc + 8, &data2, sizeof(data2)) || data2 != 0x0f05) { return false; } @@ -649,7 +649,8 @@ bool RegsX86_64::StepIfSignalHandler(uint64_t rel_pc, Elf* elf, Memory* process_ // Read the mcontext data from the stack. // sp points to the ucontext data structure, read only the mcontext part. x86_64_ucontext_t x86_64_ucontext; - if (!process_memory->Read(sp() + 0x28, &x86_64_ucontext.uc_mcontext, sizeof(x86_64_mcontext_t))) { + if (!process_memory->ReadFully(sp() + 0x28, &x86_64_ucontext.uc_mcontext, + sizeof(x86_64_mcontext_t))) { return false; } SetFromUcontext(&x86_64_ucontext); diff --git a/libunwindstack/Symbols.cpp b/libunwindstack/Symbols.cpp index 42d816a02..b4b92d635 100644 --- a/libunwindstack/Symbols.cpp +++ b/libunwindstack/Symbols.cpp @@ -71,7 +71,7 @@ bool Symbols::GetName(uint64_t addr, uint64_t load_bias, Memory* elf_memory, std bool return_value = false; while (cur_offset_ + entry_size_ <= end_) { SymType entry; - if (!elf_memory->Read(cur_offset_, &entry, sizeof(entry))) { + if (!elf_memory->ReadFully(cur_offset_, &entry, sizeof(entry))) { // Stop all processing, something looks like it is corrupted. cur_offset_ = UINT64_MAX; return false; diff --git a/libunwindstack/include/unwindstack/Memory.h b/libunwindstack/include/unwindstack/Memory.h index d747fa7ae..cab37d35f 100644 --- a/libunwindstack/include/unwindstack/Memory.h +++ b/libunwindstack/include/unwindstack/Memory.h @@ -38,7 +38,7 @@ class Memory { virtual size_t ReadPartially(uint64_t addr, void* dst, size_t size) = 0; - bool Read(uint64_t addr, void* dst, size_t size); + bool ReadFully(uint64_t addr, void* dst, size_t size); inline bool ReadField(uint64_t addr, void* start, void* field, size_t size) { if (reinterpret_cast<uintptr_t>(field) < reinterpret_cast<uintptr_t>(start)) { @@ -49,12 +49,16 @@ class Memory { return false; } // The read will check if offset + size overflows. - return Read(offset, field, size); + return ReadFully(offset, field, size); } - inline bool Read32(uint64_t addr, uint32_t* dst) { return Read(addr, dst, sizeof(uint32_t)); } + inline bool Read32(uint64_t addr, uint32_t* dst) { + return ReadFully(addr, dst, sizeof(uint32_t)); + } - inline bool Read64(uint64_t addr, uint64_t* dst) { return Read(addr, dst, sizeof(uint64_t)); } + inline bool Read64(uint64_t addr, uint64_t* dst) { + return ReadFully(addr, dst, sizeof(uint64_t)); + } }; class MemoryBuffer : public Memory { diff --git a/libunwindstack/tests/MapInfoCreateMemoryTest.cpp b/libunwindstack/tests/MapInfoCreateMemoryTest.cpp index d2aad49fa..9423e01db 100644 --- a/libunwindstack/tests/MapInfoCreateMemoryTest.cpp +++ b/libunwindstack/tests/MapInfoCreateMemoryTest.cpp @@ -120,14 +120,14 @@ TEST_F(MapInfoCreateMemoryTest, file_backed_non_zero_offset_full_file) { // Read the entire file. std::vector<uint8_t> buffer(1024); - ASSERT_TRUE(memory->Read(0, buffer.data(), 1024)); + ASSERT_TRUE(memory->ReadFully(0, buffer.data(), 1024)); ASSERT_TRUE(memcmp(buffer.data(), ELFMAG, SELFMAG) == 0); ASSERT_EQ(ELFCLASS32, buffer[EI_CLASS]); for (size_t i = EI_CLASS + 1; i < buffer.size(); i++) { ASSERT_EQ(0, buffer[i]) << "Failed at byte " << i; } - ASSERT_FALSE(memory->Read(1024, buffer.data(), 1)); + ASSERT_FALSE(memory->ReadFully(1024, buffer.data(), 1)); } // Verify that if the offset is non-zero and there is an elf at that @@ -141,14 +141,14 @@ TEST_F(MapInfoCreateMemoryTest, file_backed_non_zero_offset_partial_file) { // Read the valid part of the file. std::vector<uint8_t> buffer(0x100); - ASSERT_TRUE(memory->Read(0, buffer.data(), 0x100)); + ASSERT_TRUE(memory->ReadFully(0, buffer.data(), 0x100)); ASSERT_TRUE(memcmp(buffer.data(), ELFMAG, SELFMAG) == 0); ASSERT_EQ(ELFCLASS64, buffer[EI_CLASS]); for (size_t i = EI_CLASS + 1; i < buffer.size(); i++) { ASSERT_EQ(0, buffer[i]) << "Failed at byte " << i; } - ASSERT_FALSE(memory->Read(0x100, buffer.data(), 1)); + ASSERT_FALSE(memory->ReadFully(0x100, buffer.data(), 1)); } // Verify that if the offset is non-zero and there is an elf at that @@ -164,11 +164,11 @@ TEST_F(MapInfoCreateMemoryTest, file_backed_non_zero_offset_partial_file_whole_e // Verify the memory is a valid elf. uint8_t e_ident[SELFMAG + 1]; - ASSERT_TRUE(memory->Read(0, e_ident, SELFMAG)); + ASSERT_TRUE(memory->ReadFully(0, e_ident, SELFMAG)); ASSERT_EQ(0, memcmp(e_ident, ELFMAG, SELFMAG)); // Read past the end of what would normally be the size of the map. - ASSERT_TRUE(memory->Read(0x1000, e_ident, 1)); + ASSERT_TRUE(memory->ReadFully(0x1000, e_ident, 1)); } TEST_F(MapInfoCreateMemoryTest, file_backed_non_zero_offset_partial_file_whole_elf64) { @@ -180,11 +180,11 @@ TEST_F(MapInfoCreateMemoryTest, file_backed_non_zero_offset_partial_file_whole_e // Verify the memory is a valid elf. uint8_t e_ident[SELFMAG + 1]; - ASSERT_TRUE(memory->Read(0, e_ident, SELFMAG)); + ASSERT_TRUE(memory->ReadFully(0, e_ident, SELFMAG)); ASSERT_EQ(0, memcmp(e_ident, ELFMAG, SELFMAG)); // Read past the end of what would normally be the size of the map. - ASSERT_TRUE(memory->Read(0x1000, e_ident, 1)); + ASSERT_TRUE(memory->ReadFully(0x1000, e_ident, 1)); } // Verify that device file names will never result in Memory object creation. @@ -221,13 +221,13 @@ TEST_F(MapInfoCreateMemoryTest, process_memory) { ASSERT_TRUE(memory.get() != nullptr); memset(buffer.data(), 0, buffer.size()); - ASSERT_TRUE(memory->Read(0, buffer.data(), buffer.size())); + ASSERT_TRUE(memory->ReadFully(0, buffer.data(), buffer.size())); for (size_t i = 0; i < buffer.size(); i++) { ASSERT_EQ(i % 256, buffer[i]) << "Failed at byte " << i; } // Try to read outside of the map size. - ASSERT_FALSE(memory->Read(buffer.size(), buffer.data(), 1)); + ASSERT_FALSE(memory->ReadFully(buffer.size(), buffer.data(), 1)); } } // namespace unwindstack diff --git a/libunwindstack/tests/MapInfoGetElfTest.cpp b/libunwindstack/tests/MapInfoGetElfTest.cpp index 0b70d1337..9f7517b15 100644 --- a/libunwindstack/tests/MapInfoGetElfTest.cpp +++ b/libunwindstack/tests/MapInfoGetElfTest.cpp @@ -209,13 +209,13 @@ TEST_F(MapInfoGetElfTest, file_backed_non_zero_offset_full_file) { // Read the entire file. memset(buffer.data(), 0, buffer.size()); - ASSERT_TRUE(elf->memory()->Read(0, buffer.data(), buffer.size())); + ASSERT_TRUE(elf->memory()->ReadFully(0, buffer.data(), buffer.size())); ASSERT_EQ(0, memcmp(buffer.data(), &ehdr, sizeof(ehdr))); for (size_t i = sizeof(ehdr); i < buffer.size(); i++) { ASSERT_EQ(0, buffer[i]) << "Failed at byte " << i; } - ASSERT_FALSE(elf->memory()->Read(buffer.size(), buffer.data(), 1)); + ASSERT_FALSE(elf->memory()->ReadFully(buffer.size(), buffer.data(), 1)); } // Verify that if the offset is non-zero and there is an elf at that @@ -237,13 +237,13 @@ TEST_F(MapInfoGetElfTest, file_backed_non_zero_offset_partial_file) { ASSERT_EQ(0U, info.elf_offset); // Read the valid part of the file. - ASSERT_TRUE(elf->memory()->Read(0, buffer.data(), 0x1000)); + ASSERT_TRUE(elf->memory()->ReadFully(0, buffer.data(), 0x1000)); ASSERT_EQ(0, memcmp(buffer.data(), &ehdr, sizeof(ehdr))); for (size_t i = sizeof(ehdr); i < 0x1000; i++) { ASSERT_EQ(0, buffer[i]) << "Failed at byte " << i; } - ASSERT_FALSE(elf->memory()->Read(0x1000, buffer.data(), 1)); + ASSERT_FALSE(elf->memory()->ReadFully(0x1000, buffer.data(), 1)); } // Verify that if the offset is non-zero and there is an elf at that @@ -271,11 +271,11 @@ TEST_F(MapInfoGetElfTest, file_backed_non_zero_offset_partial_file_whole_elf32) // Verify the memory is a valid elf. memset(buffer.data(), 0, buffer.size()); - ASSERT_TRUE(elf->memory()->Read(0, buffer.data(), 0x1000)); + ASSERT_TRUE(elf->memory()->ReadFully(0, buffer.data(), 0x1000)); ASSERT_EQ(0, memcmp(buffer.data(), &ehdr, sizeof(ehdr))); // Read past the end of what would normally be the size of the map. - ASSERT_TRUE(elf->memory()->Read(0x1000, buffer.data(), 1)); + ASSERT_TRUE(elf->memory()->ReadFully(0x1000, buffer.data(), 1)); } TEST_F(MapInfoGetElfTest, file_backed_non_zero_offset_partial_file_whole_elf64) { @@ -299,11 +299,11 @@ TEST_F(MapInfoGetElfTest, file_backed_non_zero_offset_partial_file_whole_elf64) // Verify the memory is a valid elf. memset(buffer.data(), 0, buffer.size()); - ASSERT_TRUE(elf->memory()->Read(0, buffer.data(), 0x1000)); + ASSERT_TRUE(elf->memory()->ReadFully(0, buffer.data(), 0x1000)); ASSERT_EQ(0, memcmp(buffer.data(), &ehdr, sizeof(ehdr))); // Read past the end of what would normally be the size of the map. - ASSERT_TRUE(elf->memory()->Read(0x1000, buffer.data(), 1)); + ASSERT_TRUE(elf->memory()->ReadFully(0x1000, buffer.data(), 1)); } TEST_F(MapInfoGetElfTest, process_memory_not_read_only) { diff --git a/libunwindstack/tests/MemoryBufferTest.cpp b/libunwindstack/tests/MemoryBufferTest.cpp index be5a52003..350ffaee8 100644 --- a/libunwindstack/tests/MemoryBufferTest.cpp +++ b/libunwindstack/tests/MemoryBufferTest.cpp @@ -36,7 +36,7 @@ class MemoryBufferTest : public ::testing::Test { TEST_F(MemoryBufferTest, empty) { ASSERT_EQ(0U, memory_->Size()); std::vector<uint8_t> buffer(1024); - ASSERT_FALSE(memory_->Read(0, buffer.data(), 1)); + ASSERT_FALSE(memory_->ReadFully(0, buffer.data(), 1)); ASSERT_EQ(nullptr, memory_->GetPtr(0)); ASSERT_EQ(nullptr, memory_->GetPtr(1)); } @@ -55,7 +55,7 @@ TEST_F(MemoryBufferTest, write_read) { } std::vector<uint8_t> buffer(memory_->Size()); - ASSERT_TRUE(memory_->Read(0, buffer.data(), buffer.size())); + ASSERT_TRUE(memory_->ReadFully(0, buffer.data(), buffer.size())); for (size_t i = 0; i < buffer.size(); i++) { ASSERT_EQ(i, buffer[i]) << "Failed at byte " << i; } @@ -64,18 +64,18 @@ TEST_F(MemoryBufferTest, write_read) { TEST_F(MemoryBufferTest, read_failures) { memory_->Resize(100); std::vector<uint8_t> buffer(200); - ASSERT_FALSE(memory_->Read(0, buffer.data(), 101)); - ASSERT_FALSE(memory_->Read(100, buffer.data(), 1)); - ASSERT_FALSE(memory_->Read(101, buffer.data(), 2)); - ASSERT_FALSE(memory_->Read(99, buffer.data(), 2)); - ASSERT_TRUE(memory_->Read(99, buffer.data(), 1)); + ASSERT_FALSE(memory_->ReadFully(0, buffer.data(), 101)); + ASSERT_FALSE(memory_->ReadFully(100, buffer.data(), 1)); + ASSERT_FALSE(memory_->ReadFully(101, buffer.data(), 2)); + ASSERT_FALSE(memory_->ReadFully(99, buffer.data(), 2)); + ASSERT_TRUE(memory_->ReadFully(99, buffer.data(), 1)); } TEST_F(MemoryBufferTest, read_failure_overflow) { memory_->Resize(100); std::vector<uint8_t> buffer(200); - ASSERT_FALSE(memory_->Read(UINT64_MAX - 100, buffer.data(), 200)); + ASSERT_FALSE(memory_->ReadFully(UINT64_MAX - 100, buffer.data(), 200)); } TEST_F(MemoryBufferTest, ReadPartially) { diff --git a/libunwindstack/tests/MemoryFileTest.cpp b/libunwindstack/tests/MemoryFileTest.cpp index a204baec1..d7d1ace64 100644 --- a/libunwindstack/tests/MemoryFileTest.cpp +++ b/libunwindstack/tests/MemoryFileTest.cpp @@ -49,7 +49,7 @@ TEST_F(MemoryFileTest, init_offset_0) { ASSERT_TRUE(memory_.Init(tf_->path, 0)); std::vector<char> buffer(11); - ASSERT_TRUE(memory_.Read(0, buffer.data(), 10)); + ASSERT_TRUE(memory_.ReadFully(0, buffer.data(), 10)); buffer[10] = '\0'; ASSERT_STREQ("0123456789", buffer.data()); } @@ -59,7 +59,7 @@ TEST_F(MemoryFileTest, init_offset_non_zero) { ASSERT_TRUE(memory_.Init(tf_->path, 10)); std::vector<char> buffer(11); - ASSERT_TRUE(memory_.Read(0, buffer.data(), 10)); + ASSERT_TRUE(memory_.ReadFully(0, buffer.data(), 10)); buffer[10] = '\0'; ASSERT_STREQ("abcdefghij", buffer.data()); } @@ -75,7 +75,7 @@ TEST_F(MemoryFileTest, init_offset_non_zero_larger_than_pagesize) { ASSERT_TRUE(memory_.Init(tf_->path, pagesize + 15)); std::vector<char> buffer(9); - ASSERT_TRUE(memory_.Read(0, buffer.data(), 8)); + ASSERT_TRUE(memory_.ReadFully(0, buffer.data(), 8)); buffer[8] = '\0'; ASSERT_STREQ("abcdefgh", buffer.data()); } @@ -91,7 +91,7 @@ TEST_F(MemoryFileTest, init_offset_pagesize_aligned) { ASSERT_TRUE(memory_.Init(tf_->path, 2 * pagesize)); std::vector<char> buffer(11); - ASSERT_TRUE(memory_.Read(0, buffer.data(), 10)); + ASSERT_TRUE(memory_.ReadFully(0, buffer.data(), 10)); buffer[10] = '\0'; std::string expected_str; for (size_t i = 0; i < 5; i++) { @@ -112,7 +112,7 @@ TEST_F(MemoryFileTest, init_offset_pagesize_aligned_plus_extra) { ASSERT_TRUE(memory_.Init(tf_->path, 2 * pagesize + 10)); std::vector<char> buffer(11); - ASSERT_TRUE(memory_.Read(0, buffer.data(), 10)); + ASSERT_TRUE(memory_.ReadFully(0, buffer.data(), 10)); buffer[10] = '\0'; std::string expected_str; for (size_t i = 0; i < 5; i++) { @@ -149,19 +149,19 @@ TEST_F(MemoryFileTest, read_error) { std::vector<char> buffer(100); // Read before init. - ASSERT_FALSE(memory_.Read(0, buffer.data(), 10)); + ASSERT_FALSE(memory_.ReadFully(0, buffer.data(), 10)); ASSERT_TRUE(memory_.Init(tf_->path, 0)); - ASSERT_FALSE(memory_.Read(10000, buffer.data(), 10)); - ASSERT_FALSE(memory_.Read(5000, buffer.data(), 10)); - ASSERT_FALSE(memory_.Read(4990, buffer.data(), 11)); - ASSERT_TRUE(memory_.Read(4990, buffer.data(), 10)); - ASSERT_FALSE(memory_.Read(4999, buffer.data(), 2)); - ASSERT_TRUE(memory_.Read(4999, buffer.data(), 1)); + ASSERT_FALSE(memory_.ReadFully(10000, buffer.data(), 10)); + ASSERT_FALSE(memory_.ReadFully(5000, buffer.data(), 10)); + ASSERT_FALSE(memory_.ReadFully(4990, buffer.data(), 11)); + ASSERT_TRUE(memory_.ReadFully(4990, buffer.data(), 10)); + ASSERT_FALSE(memory_.ReadFully(4999, buffer.data(), 2)); + ASSERT_TRUE(memory_.ReadFully(4999, buffer.data(), 1)); // Check that overflow fails properly. - ASSERT_FALSE(memory_.Read(UINT64_MAX - 100, buffer.data(), 200)); + ASSERT_FALSE(memory_.ReadFully(UINT64_MAX - 100, buffer.data(), 200)); } TEST_F(MemoryFileTest, read_past_file_within_mapping) { @@ -178,7 +178,8 @@ TEST_F(MemoryFileTest, read_past_file_within_mapping) { for (size_t i = 0; i < 100; i++) { uint8_t value; - ASSERT_FALSE(memory_.Read(buffer.size() + i, &value, 1)) << "Should have failed at value " << i; + ASSERT_FALSE(memory_.ReadFully(buffer.size() + i, &value, 1)) + << "Should have failed at value " << i; } } @@ -195,8 +196,8 @@ TEST_F(MemoryFileTest, map_partial_offset_aligned) { std::vector<uint8_t> read_buffer(pagesize * 2); // Make sure that reading after mapped data is a failure. - ASSERT_FALSE(memory_.Read(pagesize * 2, read_buffer.data(), 1)); - ASSERT_TRUE(memory_.Read(0, read_buffer.data(), pagesize * 2)); + ASSERT_FALSE(memory_.ReadFully(pagesize * 2, read_buffer.data(), 1)); + ASSERT_TRUE(memory_.ReadFully(0, read_buffer.data(), pagesize * 2)); for (size_t i = 0; i < pagesize; i++) { ASSERT_EQ(2, read_buffer[i]) << "Failed at byte " << i; } @@ -219,8 +220,8 @@ TEST_F(MemoryFileTest, map_partial_offset_unaligned) { std::vector<uint8_t> read_buffer(pagesize * 2); // Make sure that reading after mapped data is a failure. - ASSERT_FALSE(memory_.Read(pagesize * 2, read_buffer.data(), 1)); - ASSERT_TRUE(memory_.Read(0, read_buffer.data(), pagesize * 2)); + ASSERT_FALSE(memory_.ReadFully(pagesize * 2, read_buffer.data(), 1)); + ASSERT_TRUE(memory_.ReadFully(0, read_buffer.data(), pagesize * 2)); for (size_t i = 0; i < pagesize - 0x100; i++) { ASSERT_EQ(2, read_buffer[i]) << "Failed at byte " << i; } @@ -245,8 +246,8 @@ TEST_F(MemoryFileTest, map_overflow) { ASSERT_TRUE(memory_.Init(tf_->path, pagesize + 0x100, UINT64_MAX)); std::vector<uint8_t> read_buffer(pagesize * 10); - ASSERT_FALSE(memory_.Read(pagesize * 9 - 0x100 + 1, read_buffer.data(), 1)); - ASSERT_TRUE(memory_.Read(0, read_buffer.data(), pagesize * 9 - 0x100)); + ASSERT_FALSE(memory_.ReadFully(pagesize * 9 - 0x100 + 1, read_buffer.data(), 1)); + ASSERT_TRUE(memory_.ReadFully(0, read_buffer.data(), pagesize * 9 - 0x100)); } TEST_F(MemoryFileTest, init_reinit) { @@ -259,14 +260,14 @@ TEST_F(MemoryFileTest, init_reinit) { ASSERT_TRUE(memory_.Init(tf_->path, 0)); std::vector<uint8_t> read_buffer(buffer.size()); - ASSERT_TRUE(memory_.Read(0, read_buffer.data(), pagesize)); + ASSERT_TRUE(memory_.ReadFully(0, read_buffer.data(), pagesize)); for (size_t i = 0; i < pagesize; i++) { ASSERT_EQ(1, read_buffer[i]) << "Failed at byte " << i; } // Now reinit. ASSERT_TRUE(memory_.Init(tf_->path, pagesize)); - ASSERT_TRUE(memory_.Read(0, read_buffer.data(), pagesize)); + ASSERT_TRUE(memory_.ReadFully(0, read_buffer.data(), pagesize)); for (size_t i = 0; i < pagesize; i++) { ASSERT_EQ(2, read_buffer[i]) << "Failed at byte " << i; } diff --git a/libunwindstack/tests/MemoryLocalTest.cpp b/libunwindstack/tests/MemoryLocalTest.cpp index 957b239a6..c483b74dc 100644 --- a/libunwindstack/tests/MemoryLocalTest.cpp +++ b/libunwindstack/tests/MemoryLocalTest.cpp @@ -33,14 +33,14 @@ TEST(MemoryLocalTest, read) { MemoryLocal local; std::vector<uint8_t> dst(1024); - ASSERT_TRUE(local.Read(reinterpret_cast<uint64_t>(src.data()), dst.data(), 1024)); + ASSERT_TRUE(local.ReadFully(reinterpret_cast<uint64_t>(src.data()), dst.data(), 1024)); ASSERT_EQ(0, memcmp(src.data(), dst.data(), 1024)); for (size_t i = 0; i < 1024; i++) { ASSERT_EQ(0x4cU, dst[i]); } memset(src.data(), 0x23, 512); - ASSERT_TRUE(local.Read(reinterpret_cast<uint64_t>(src.data()), dst.data(), 1024)); + ASSERT_TRUE(local.ReadFully(reinterpret_cast<uint64_t>(src.data()), dst.data(), 1024)); ASSERT_EQ(0, memcmp(src.data(), dst.data(), 1024)); for (size_t i = 0; i < 512; i++) { ASSERT_EQ(0x23U, dst[i]); @@ -54,8 +54,8 @@ TEST(MemoryLocalTest, read_illegal) { MemoryLocal local; std::vector<uint8_t> dst(100); - ASSERT_FALSE(local.Read(0, dst.data(), 1)); - ASSERT_FALSE(local.Read(0, dst.data(), 100)); + ASSERT_FALSE(local.ReadFully(0, dst.data(), 1)); + ASSERT_FALSE(local.ReadFully(0, dst.data(), 100)); } TEST(MemoryLocalTest, read_overflow) { @@ -65,7 +65,7 @@ TEST(MemoryLocalTest, read_overflow) { // version will always go through the overflow check. std::vector<uint8_t> dst(100); uint64_t value; - ASSERT_FALSE(local.Read(reinterpret_cast<uint64_t>(&value), dst.data(), SIZE_MAX)); + ASSERT_FALSE(local.ReadFully(reinterpret_cast<uint64_t>(&value), dst.data(), SIZE_MAX)); } TEST(MemoryLocalTest, ReadPartially) { diff --git a/libunwindstack/tests/MemoryRangeTest.cpp b/libunwindstack/tests/MemoryRangeTest.cpp index 4a764f59f..499536c0f 100644 --- a/libunwindstack/tests/MemoryRangeTest.cpp +++ b/libunwindstack/tests/MemoryRangeTest.cpp @@ -38,7 +38,7 @@ TEST(MemoryRangeTest, read) { MemoryRange range(process_memory, 9001, src.size(), 0); std::vector<uint8_t> dst(1024); - ASSERT_TRUE(range.Read(0, dst.data(), src.size())); + ASSERT_TRUE(range.ReadFully(0, dst.data(), src.size())); for (size_t i = 0; i < 1024; i++) { ASSERT_EQ(0x4cU, dst[i]) << "Failed at byte " << i; } @@ -54,18 +54,18 @@ TEST(MemoryRangeTest, read_near_limit) { MemoryRange range(process_memory, 1000, 1024, 0); std::vector<uint8_t> dst(1024); - ASSERT_TRUE(range.Read(1020, dst.data(), 4)); + ASSERT_TRUE(range.ReadFully(1020, dst.data(), 4)); for (size_t i = 0; i < 4; i++) { ASSERT_EQ(0x4cU, dst[i]) << "Failed at byte " << i; } // Verify that reads outside of the range will fail. - ASSERT_FALSE(range.Read(1020, dst.data(), 5)); - ASSERT_FALSE(range.Read(1024, dst.data(), 1)); - ASSERT_FALSE(range.Read(1024, dst.data(), 1024)); + ASSERT_FALSE(range.ReadFully(1020, dst.data(), 5)); + ASSERT_FALSE(range.ReadFully(1024, dst.data(), 1)); + ASSERT_FALSE(range.ReadFully(1024, dst.data(), 1024)); // Verify that reading up to the end works. - ASSERT_TRUE(range.Read(1020, dst.data(), 4)); + ASSERT_TRUE(range.ReadFully(1020, dst.data(), 4)); } TEST(MemoryRangeTest, read_overflow) { @@ -73,7 +73,7 @@ TEST(MemoryRangeTest, read_overflow) { std::shared_ptr<Memory> process_memory(new MemoryFakeAlwaysReadZero); std::unique_ptr<MemoryRange> overflow(new MemoryRange(process_memory, 100, 200, 0)); - ASSERT_FALSE(overflow->Read(UINT64_MAX - 10, buffer.data(), 100)); + ASSERT_FALSE(overflow->ReadFully(UINT64_MAX - 10, buffer.data(), 100)); } TEST(MemoryRangeTest, ReadPartially) { diff --git a/libunwindstack/tests/MemoryRemoteTest.cpp b/libunwindstack/tests/MemoryRemoteTest.cpp index 8ab806819..73cace319 100644 --- a/libunwindstack/tests/MemoryRemoteTest.cpp +++ b/libunwindstack/tests/MemoryRemoteTest.cpp @@ -71,7 +71,7 @@ TEST_F(MemoryRemoteTest, read) { MemoryRemote remote(pid); std::vector<uint8_t> dst(1024); - ASSERT_TRUE(remote.Read(reinterpret_cast<uint64_t>(src.data()), dst.data(), 1024)); + ASSERT_TRUE(remote.ReadFully(reinterpret_cast<uint64_t>(src.data()), dst.data(), 1024)); for (size_t i = 0; i < 1024; i++) { ASSERT_EQ(0x4cU, dst[i]) << "Failed at byte " << i; } @@ -90,7 +90,8 @@ TEST_F(MemoryRemoteTest, ReadPartially) { pid_t pid; if ((pid = fork()) == 0) { - while (true); + while (true) + ; exit(1); } ASSERT_LT(0, pid); @@ -133,17 +134,17 @@ TEST_F(MemoryRemoteTest, read_fail) { MemoryRemote remote(pid); std::vector<uint8_t> dst(pagesize); - ASSERT_TRUE(remote.Read(reinterpret_cast<uint64_t>(src), dst.data(), pagesize)); + ASSERT_TRUE(remote.ReadFully(reinterpret_cast<uint64_t>(src), dst.data(), pagesize)); for (size_t i = 0; i < 1024; i++) { ASSERT_EQ(0x4cU, dst[i]) << "Failed at byte " << i; } - ASSERT_FALSE(remote.Read(reinterpret_cast<uint64_t>(src) + pagesize, dst.data(), 1)); - ASSERT_TRUE(remote.Read(reinterpret_cast<uint64_t>(src) + pagesize - 1, dst.data(), 1)); - ASSERT_FALSE(remote.Read(reinterpret_cast<uint64_t>(src) + pagesize - 4, dst.data(), 8)); + ASSERT_FALSE(remote.ReadFully(reinterpret_cast<uint64_t>(src) + pagesize, dst.data(), 1)); + ASSERT_TRUE(remote.ReadFully(reinterpret_cast<uint64_t>(src) + pagesize - 1, dst.data(), 1)); + ASSERT_FALSE(remote.ReadFully(reinterpret_cast<uint64_t>(src) + pagesize - 4, dst.data(), 8)); // Check overflow condition is caught properly. - ASSERT_FALSE(remote.Read(UINT64_MAX - 100, dst.data(), 200)); + ASSERT_FALSE(remote.ReadFully(UINT64_MAX - 100, dst.data(), 200)); ASSERT_EQ(0, munmap(src, pagesize)); @@ -153,7 +154,8 @@ TEST_F(MemoryRemoteTest, read_fail) { TEST_F(MemoryRemoteTest, read_overflow) { pid_t pid; if ((pid = fork()) == 0) { - while (true); + while (true) + ; exit(1); } ASSERT_LT(0, pid); @@ -165,7 +167,7 @@ TEST_F(MemoryRemoteTest, read_overflow) { // Check overflow condition is caught properly. std::vector<uint8_t> dst(200); - ASSERT_FALSE(remote.Read(UINT64_MAX - 100, dst.data(), 200)); + ASSERT_FALSE(remote.ReadFully(UINT64_MAX - 100, dst.data(), 200)); ASSERT_TRUE(Detach(pid)); } @@ -184,8 +186,8 @@ TEST_F(MemoryRemoteTest, read_illegal) { MemoryRemote remote(pid); std::vector<uint8_t> dst(100); - ASSERT_FALSE(remote.Read(0, dst.data(), 1)); - ASSERT_FALSE(remote.Read(0, dst.data(), 100)); + ASSERT_FALSE(remote.ReadFully(0, dst.data(), 1)); + ASSERT_FALSE(remote.ReadFully(0, dst.data(), 100)); ASSERT_TRUE(Detach(pid)); } diff --git a/libunwindstack/tests/UnwindTest.cpp b/libunwindstack/tests/UnwindTest.cpp index 9f9ca8b52..57aec9784 100644 --- a/libunwindstack/tests/UnwindTest.cpp +++ b/libunwindstack/tests/UnwindTest.cpp @@ -174,7 +174,7 @@ void WaitForRemote(pid_t pid, uint64_t addr, bool leave_attached, bool* complete MemoryRemote memory(pid); // Read the remote value to see if we are ready. bool value; - if (memory.Read(addr, &value, sizeof(value)) && value) { + if (memory.ReadFully(addr, &value, sizeof(value)) && value) { *completed = true; } if (!*completed || !leave_attached) { |
