xref: /aosp_15_r20/system/unwinding/libunwindstack/tests/MemoryRemoteTest.cpp (revision eb293b8f56ee8303637c5595cfcdeef8039e85c6)
1*eb293b8fSAndroid Build Coastguard Worker /*
2*eb293b8fSAndroid Build Coastguard Worker  * Copyright (C) 2016 The Android Open Source Project
3*eb293b8fSAndroid Build Coastguard Worker  *
4*eb293b8fSAndroid Build Coastguard Worker  * Licensed under the Apache License, Version 2.0 (the "License");
5*eb293b8fSAndroid Build Coastguard Worker  * you may not use this file except in compliance with the License.
6*eb293b8fSAndroid Build Coastguard Worker  * You may obtain a copy of the License at
7*eb293b8fSAndroid Build Coastguard Worker  *
8*eb293b8fSAndroid Build Coastguard Worker  *      http://www.apache.org/licenses/LICENSE-2.0
9*eb293b8fSAndroid Build Coastguard Worker  *
10*eb293b8fSAndroid Build Coastguard Worker  * Unless required by applicable law or agreed to in writing, software
11*eb293b8fSAndroid Build Coastguard Worker  * distributed under the License is distributed on an "AS IS" BASIS,
12*eb293b8fSAndroid Build Coastguard Worker  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13*eb293b8fSAndroid Build Coastguard Worker  * See the License for the specific language governing permissions and
14*eb293b8fSAndroid Build Coastguard Worker  * limitations under the License.
15*eb293b8fSAndroid Build Coastguard Worker  */
16*eb293b8fSAndroid Build Coastguard Worker 
17*eb293b8fSAndroid Build Coastguard Worker #include <errno.h>
18*eb293b8fSAndroid Build Coastguard Worker #include <signal.h>
19*eb293b8fSAndroid Build Coastguard Worker #include <stdint.h>
20*eb293b8fSAndroid Build Coastguard Worker #include <stdlib.h>
21*eb293b8fSAndroid Build Coastguard Worker #include <string.h>
22*eb293b8fSAndroid Build Coastguard Worker #include <sys/mman.h>
23*eb293b8fSAndroid Build Coastguard Worker #include <sys/ptrace.h>
24*eb293b8fSAndroid Build Coastguard Worker #include <sys/types.h>
25*eb293b8fSAndroid Build Coastguard Worker #include <unistd.h>
26*eb293b8fSAndroid Build Coastguard Worker 
27*eb293b8fSAndroid Build Coastguard Worker #include <vector>
28*eb293b8fSAndroid Build Coastguard Worker 
29*eb293b8fSAndroid Build Coastguard Worker #include <android-base/file.h>
30*eb293b8fSAndroid Build Coastguard Worker #include <android-base/test_utils.h>
31*eb293b8fSAndroid Build Coastguard Worker #include <gtest/gtest.h>
32*eb293b8fSAndroid Build Coastguard Worker 
33*eb293b8fSAndroid Build Coastguard Worker #include "MemoryRemote.h"
34*eb293b8fSAndroid Build Coastguard Worker 
35*eb293b8fSAndroid Build Coastguard Worker #include "ForkTest.h"
36*eb293b8fSAndroid Build Coastguard Worker #include "MemoryFake.h"
37*eb293b8fSAndroid Build Coastguard Worker #include "PidUtils.h"
38*eb293b8fSAndroid Build Coastguard Worker #include "TestUtils.h"
39*eb293b8fSAndroid Build Coastguard Worker 
40*eb293b8fSAndroid Build Coastguard Worker namespace unwindstack {
41*eb293b8fSAndroid Build Coastguard Worker 
42*eb293b8fSAndroid Build Coastguard Worker using MemoryRemoteTest = ForkTest;
43*eb293b8fSAndroid Build Coastguard Worker 
TEST_F(MemoryRemoteTest,read)44*eb293b8fSAndroid Build Coastguard Worker TEST_F(MemoryRemoteTest, read) {
45*eb293b8fSAndroid Build Coastguard Worker   std::vector<uint8_t> src(1024);
46*eb293b8fSAndroid Build Coastguard Worker   memset(src.data(), 0x4c, 1024);
47*eb293b8fSAndroid Build Coastguard Worker 
48*eb293b8fSAndroid Build Coastguard Worker   ASSERT_NO_FATAL_FAILURE(Fork());
49*eb293b8fSAndroid Build Coastguard Worker 
50*eb293b8fSAndroid Build Coastguard Worker   MemoryRemote remote(pid_);
51*eb293b8fSAndroid Build Coastguard Worker 
52*eb293b8fSAndroid Build Coastguard Worker   std::vector<uint8_t> dst(1024);
53*eb293b8fSAndroid Build Coastguard Worker   ASSERT_TRUE(remote.ReadFully(reinterpret_cast<uint64_t>(src.data()), dst.data(), 1024));
54*eb293b8fSAndroid Build Coastguard Worker   for (size_t i = 0; i < 1024; i++) {
55*eb293b8fSAndroid Build Coastguard Worker     ASSERT_EQ(0x4cU, dst[i]) << "Failed at byte " << i;
56*eb293b8fSAndroid Build Coastguard Worker   }
57*eb293b8fSAndroid Build Coastguard Worker }
58*eb293b8fSAndroid Build Coastguard Worker 
TEST_F(MemoryRemoteTest,read_large)59*eb293b8fSAndroid Build Coastguard Worker TEST_F(MemoryRemoteTest, read_large) {
60*eb293b8fSAndroid Build Coastguard Worker   static constexpr size_t kTotalPages = 245;
61*eb293b8fSAndroid Build Coastguard Worker   std::vector<uint8_t> src(kTotalPages * getpagesize());
62*eb293b8fSAndroid Build Coastguard Worker   for (size_t i = 0; i < kTotalPages; i++) {
63*eb293b8fSAndroid Build Coastguard Worker     memset(&src[i * getpagesize()], i, getpagesize());
64*eb293b8fSAndroid Build Coastguard Worker   }
65*eb293b8fSAndroid Build Coastguard Worker 
66*eb293b8fSAndroid Build Coastguard Worker   ASSERT_NO_FATAL_FAILURE(Fork());
67*eb293b8fSAndroid Build Coastguard Worker 
68*eb293b8fSAndroid Build Coastguard Worker   MemoryRemote remote(pid_);
69*eb293b8fSAndroid Build Coastguard Worker 
70*eb293b8fSAndroid Build Coastguard Worker   std::vector<uint8_t> dst(kTotalPages * getpagesize());
71*eb293b8fSAndroid Build Coastguard Worker   ASSERT_TRUE(remote.ReadFully(reinterpret_cast<uint64_t>(src.data()), dst.data(), src.size()));
72*eb293b8fSAndroid Build Coastguard Worker   for (size_t i = 0; i < kTotalPages * getpagesize(); i++) {
73*eb293b8fSAndroid Build Coastguard Worker     ASSERT_EQ(i / getpagesize(), dst[i]) << "Failed at byte " << i;
74*eb293b8fSAndroid Build Coastguard Worker   }
75*eb293b8fSAndroid Build Coastguard Worker }
76*eb293b8fSAndroid Build Coastguard Worker 
TEST_F(MemoryRemoteTest,read_partial)77*eb293b8fSAndroid Build Coastguard Worker TEST_F(MemoryRemoteTest, read_partial) {
78*eb293b8fSAndroid Build Coastguard Worker   char* mapping = static_cast<char*>(
79*eb293b8fSAndroid Build Coastguard Worker       mmap(nullptr, 4 * getpagesize(), PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS, -1, 0));
80*eb293b8fSAndroid Build Coastguard Worker   ASSERT_NE(MAP_FAILED, mapping);
81*eb293b8fSAndroid Build Coastguard Worker   memset(mapping, 0x4c, 4 * getpagesize());
82*eb293b8fSAndroid Build Coastguard Worker   ASSERT_EQ(0, mprotect(mapping + getpagesize(), getpagesize(), PROT_NONE));
83*eb293b8fSAndroid Build Coastguard Worker   ASSERT_EQ(0, munmap(mapping + 3 * getpagesize(), getpagesize()));
84*eb293b8fSAndroid Build Coastguard Worker 
85*eb293b8fSAndroid Build Coastguard Worker   ASSERT_NO_FATAL_FAILURE(Fork());
86*eb293b8fSAndroid Build Coastguard Worker 
87*eb293b8fSAndroid Build Coastguard Worker   // Unmap from our process.
88*eb293b8fSAndroid Build Coastguard Worker   ASSERT_EQ(0, munmap(mapping, 3 * getpagesize()));
89*eb293b8fSAndroid Build Coastguard Worker 
90*eb293b8fSAndroid Build Coastguard Worker   MemoryRemote remote(pid_);
91*eb293b8fSAndroid Build Coastguard Worker 
92*eb293b8fSAndroid Build Coastguard Worker   std::vector<uint8_t> dst(4096);
93*eb293b8fSAndroid Build Coastguard Worker   size_t bytes =
94*eb293b8fSAndroid Build Coastguard Worker       remote.Read(reinterpret_cast<uint64_t>(mapping + getpagesize() - 1024), dst.data(), 4096);
95*eb293b8fSAndroid Build Coastguard Worker   // Some read methods can read PROT_NONE maps, allow that.
96*eb293b8fSAndroid Build Coastguard Worker   ASSERT_LE(1024U, bytes);
97*eb293b8fSAndroid Build Coastguard Worker   for (size_t i = 0; i < bytes; i++) {
98*eb293b8fSAndroid Build Coastguard Worker     ASSERT_EQ(0x4cU, dst[i]) << "Failed at byte " << i;
99*eb293b8fSAndroid Build Coastguard Worker   }
100*eb293b8fSAndroid Build Coastguard Worker 
101*eb293b8fSAndroid Build Coastguard Worker   // Now verify that reading stops at the end of a map.
102*eb293b8fSAndroid Build Coastguard Worker   bytes =
103*eb293b8fSAndroid Build Coastguard Worker       remote.Read(reinterpret_cast<uint64_t>(mapping + 3 * getpagesize() - 1024), dst.data(), 4096);
104*eb293b8fSAndroid Build Coastguard Worker   ASSERT_EQ(1024U, bytes);
105*eb293b8fSAndroid Build Coastguard Worker   for (size_t i = 0; i < bytes; i++) {
106*eb293b8fSAndroid Build Coastguard Worker     ASSERT_EQ(0x4cU, dst[i]) << "Failed at byte " << i;
107*eb293b8fSAndroid Build Coastguard Worker   }
108*eb293b8fSAndroid Build Coastguard Worker }
109*eb293b8fSAndroid Build Coastguard Worker 
TEST_F(MemoryRemoteTest,read_fail)110*eb293b8fSAndroid Build Coastguard Worker TEST_F(MemoryRemoteTest, read_fail) {
111*eb293b8fSAndroid Build Coastguard Worker   int pagesize = getpagesize();
112*eb293b8fSAndroid Build Coastguard Worker   void* src = mmap(nullptr, pagesize * 2, PROT_READ | PROT_WRITE, MAP_ANON | MAP_PRIVATE,-1, 0);
113*eb293b8fSAndroid Build Coastguard Worker   memset(src, 0x4c, pagesize * 2);
114*eb293b8fSAndroid Build Coastguard Worker   ASSERT_NE(MAP_FAILED, src);
115*eb293b8fSAndroid Build Coastguard Worker   // Put a hole right after the first page.
116*eb293b8fSAndroid Build Coastguard Worker   ASSERT_EQ(0, munmap(reinterpret_cast<void*>(reinterpret_cast<uintptr_t>(src) + pagesize),
117*eb293b8fSAndroid Build Coastguard Worker                       pagesize));
118*eb293b8fSAndroid Build Coastguard Worker 
119*eb293b8fSAndroid Build Coastguard Worker   ASSERT_NO_FATAL_FAILURE(Fork());
120*eb293b8fSAndroid Build Coastguard Worker 
121*eb293b8fSAndroid Build Coastguard Worker   MemoryRemote remote(pid_);
122*eb293b8fSAndroid Build Coastguard Worker 
123*eb293b8fSAndroid Build Coastguard Worker   std::vector<uint8_t> dst(pagesize);
124*eb293b8fSAndroid Build Coastguard Worker   ASSERT_TRUE(remote.ReadFully(reinterpret_cast<uint64_t>(src), dst.data(), pagesize));
125*eb293b8fSAndroid Build Coastguard Worker   for (size_t i = 0; i < 1024; i++) {
126*eb293b8fSAndroid Build Coastguard Worker     ASSERT_EQ(0x4cU, dst[i]) << "Failed at byte " << i;
127*eb293b8fSAndroid Build Coastguard Worker   }
128*eb293b8fSAndroid Build Coastguard Worker 
129*eb293b8fSAndroid Build Coastguard Worker   ASSERT_FALSE(remote.ReadFully(reinterpret_cast<uint64_t>(src) + pagesize, dst.data(), 1));
130*eb293b8fSAndroid Build Coastguard Worker   ASSERT_TRUE(remote.ReadFully(reinterpret_cast<uint64_t>(src) + pagesize - 1, dst.data(), 1));
131*eb293b8fSAndroid Build Coastguard Worker   ASSERT_FALSE(remote.ReadFully(reinterpret_cast<uint64_t>(src) + pagesize - 4, dst.data(), 8));
132*eb293b8fSAndroid Build Coastguard Worker 
133*eb293b8fSAndroid Build Coastguard Worker   // Check overflow condition is caught properly.
134*eb293b8fSAndroid Build Coastguard Worker   ASSERT_FALSE(remote.ReadFully(UINT64_MAX - 100, dst.data(), 200));
135*eb293b8fSAndroid Build Coastguard Worker 
136*eb293b8fSAndroid Build Coastguard Worker   ASSERT_EQ(0, munmap(src, pagesize));
137*eb293b8fSAndroid Build Coastguard Worker }
138*eb293b8fSAndroid Build Coastguard Worker 
TEST_F(MemoryRemoteTest,read_overflow)139*eb293b8fSAndroid Build Coastguard Worker TEST_F(MemoryRemoteTest, read_overflow) {
140*eb293b8fSAndroid Build Coastguard Worker   ASSERT_NO_FATAL_FAILURE(Fork());
141*eb293b8fSAndroid Build Coastguard Worker 
142*eb293b8fSAndroid Build Coastguard Worker   MemoryRemote remote(pid_);
143*eb293b8fSAndroid Build Coastguard Worker 
144*eb293b8fSAndroid Build Coastguard Worker   // Check overflow condition is caught properly.
145*eb293b8fSAndroid Build Coastguard Worker   std::vector<uint8_t> dst(200);
146*eb293b8fSAndroid Build Coastguard Worker   ASSERT_FALSE(remote.ReadFully(UINT64_MAX - 100, dst.data(), 200));
147*eb293b8fSAndroid Build Coastguard Worker }
148*eb293b8fSAndroid Build Coastguard Worker 
TEST_F(MemoryRemoteTest,read_illegal)149*eb293b8fSAndroid Build Coastguard Worker TEST_F(MemoryRemoteTest, read_illegal) {
150*eb293b8fSAndroid Build Coastguard Worker   ASSERT_NO_FATAL_FAILURE(Fork());
151*eb293b8fSAndroid Build Coastguard Worker 
152*eb293b8fSAndroid Build Coastguard Worker   MemoryRemote remote(pid_);
153*eb293b8fSAndroid Build Coastguard Worker 
154*eb293b8fSAndroid Build Coastguard Worker   std::vector<uint8_t> dst(100);
155*eb293b8fSAndroid Build Coastguard Worker   ASSERT_FALSE(remote.ReadFully(0, dst.data(), 1));
156*eb293b8fSAndroid Build Coastguard Worker   ASSERT_FALSE(remote.ReadFully(0, dst.data(), 100));
157*eb293b8fSAndroid Build Coastguard Worker }
158*eb293b8fSAndroid Build Coastguard Worker 
TEST_F(MemoryRemoteTest,read_mprotect_hole)159*eb293b8fSAndroid Build Coastguard Worker TEST_F(MemoryRemoteTest, read_mprotect_hole) {
160*eb293b8fSAndroid Build Coastguard Worker   size_t page_size = getpagesize();
161*eb293b8fSAndroid Build Coastguard Worker   void* mapping =
162*eb293b8fSAndroid Build Coastguard Worker       mmap(nullptr, 3 * getpagesize(), PROT_READ | PROT_WRITE, MAP_ANONYMOUS | MAP_PRIVATE, -1, 0);
163*eb293b8fSAndroid Build Coastguard Worker   ASSERT_NE(MAP_FAILED, mapping);
164*eb293b8fSAndroid Build Coastguard Worker   memset(mapping, 0xFF, 3 * page_size);
165*eb293b8fSAndroid Build Coastguard Worker   ASSERT_EQ(0, mprotect(static_cast<char*>(mapping) + page_size, page_size, PROT_NONE));
166*eb293b8fSAndroid Build Coastguard Worker 
167*eb293b8fSAndroid Build Coastguard Worker   ASSERT_NO_FATAL_FAILURE(Fork());
168*eb293b8fSAndroid Build Coastguard Worker 
169*eb293b8fSAndroid Build Coastguard Worker   ASSERT_EQ(0, munmap(mapping, 3 * page_size));
170*eb293b8fSAndroid Build Coastguard Worker 
171*eb293b8fSAndroid Build Coastguard Worker   MemoryRemote remote(pid_);
172*eb293b8fSAndroid Build Coastguard Worker   std::vector<uint8_t> dst(getpagesize() * 4, 0xCC);
173*eb293b8fSAndroid Build Coastguard Worker   size_t read_size = remote.Read(reinterpret_cast<uint64_t>(mapping), dst.data(), page_size * 3);
174*eb293b8fSAndroid Build Coastguard Worker   // Some read methods can read PROT_NONE maps, allow that.
175*eb293b8fSAndroid Build Coastguard Worker   ASSERT_LE(page_size, read_size);
176*eb293b8fSAndroid Build Coastguard Worker   for (size_t i = 0; i < read_size; ++i) {
177*eb293b8fSAndroid Build Coastguard Worker     ASSERT_EQ(0xFF, dst[i]);
178*eb293b8fSAndroid Build Coastguard Worker   }
179*eb293b8fSAndroid Build Coastguard Worker   for (size_t i = read_size; i < dst.size(); ++i) {
180*eb293b8fSAndroid Build Coastguard Worker     ASSERT_EQ(0xCC, dst[i]);
181*eb293b8fSAndroid Build Coastguard Worker   }
182*eb293b8fSAndroid Build Coastguard Worker }
183*eb293b8fSAndroid Build Coastguard Worker 
TEST_F(MemoryRemoteTest,read_munmap_hole)184*eb293b8fSAndroid Build Coastguard Worker TEST_F(MemoryRemoteTest, read_munmap_hole) {
185*eb293b8fSAndroid Build Coastguard Worker   size_t page_size = getpagesize();
186*eb293b8fSAndroid Build Coastguard Worker   void* mapping =
187*eb293b8fSAndroid Build Coastguard Worker       mmap(nullptr, 3 * getpagesize(), PROT_READ | PROT_WRITE, MAP_ANONYMOUS | MAP_PRIVATE, -1, 0);
188*eb293b8fSAndroid Build Coastguard Worker   ASSERT_NE(MAP_FAILED, mapping);
189*eb293b8fSAndroid Build Coastguard Worker   memset(mapping, 0xFF, 3 * page_size);
190*eb293b8fSAndroid Build Coastguard Worker   ASSERT_EQ(0, munmap(static_cast<char*>(mapping) + page_size, page_size));
191*eb293b8fSAndroid Build Coastguard Worker 
192*eb293b8fSAndroid Build Coastguard Worker   ASSERT_NO_FATAL_FAILURE(Fork());
193*eb293b8fSAndroid Build Coastguard Worker 
194*eb293b8fSAndroid Build Coastguard Worker   ASSERT_EQ(0, munmap(mapping, page_size));
195*eb293b8fSAndroid Build Coastguard Worker   ASSERT_EQ(0, munmap(static_cast<char*>(mapping) + 2 * page_size, page_size));
196*eb293b8fSAndroid Build Coastguard Worker 
197*eb293b8fSAndroid Build Coastguard Worker   MemoryRemote remote(pid_);
198*eb293b8fSAndroid Build Coastguard Worker   std::vector<uint8_t> dst(getpagesize() * 4, 0xCC);
199*eb293b8fSAndroid Build Coastguard Worker   size_t read_size = remote.Read(reinterpret_cast<uint64_t>(mapping), dst.data(), page_size * 3);
200*eb293b8fSAndroid Build Coastguard Worker   ASSERT_EQ(page_size, read_size);
201*eb293b8fSAndroid Build Coastguard Worker   for (size_t i = 0; i < read_size; ++i) {
202*eb293b8fSAndroid Build Coastguard Worker     ASSERT_EQ(0xFF, dst[i]);
203*eb293b8fSAndroid Build Coastguard Worker   }
204*eb293b8fSAndroid Build Coastguard Worker   for (size_t i = read_size; i < dst.size(); ++i) {
205*eb293b8fSAndroid Build Coastguard Worker     ASSERT_EQ(0xCC, dst[i]);
206*eb293b8fSAndroid Build Coastguard Worker   }
207*eb293b8fSAndroid Build Coastguard Worker }
208*eb293b8fSAndroid Build Coastguard Worker 
209*eb293b8fSAndroid Build Coastguard Worker // Verify that the memory remote object chooses a memory read function
210*eb293b8fSAndroid Build Coastguard Worker // properly. Either process_vm_readv or ptrace.
TEST_F(MemoryRemoteTest,read_choose_correctly)211*eb293b8fSAndroid Build Coastguard Worker TEST_F(MemoryRemoteTest, read_choose_correctly) {
212*eb293b8fSAndroid Build Coastguard Worker   size_t page_size = getpagesize();
213*eb293b8fSAndroid Build Coastguard Worker   void* mapping =
214*eb293b8fSAndroid Build Coastguard Worker       mmap(nullptr, 2 * getpagesize(), PROT_READ | PROT_WRITE, MAP_ANONYMOUS | MAP_PRIVATE, -1, 0);
215*eb293b8fSAndroid Build Coastguard Worker   ASSERT_NE(MAP_FAILED, mapping);
216*eb293b8fSAndroid Build Coastguard Worker   memset(mapping, 0xFC, 2 * page_size);
217*eb293b8fSAndroid Build Coastguard Worker   ASSERT_EQ(0, mprotect(static_cast<char*>(mapping), page_size, PROT_NONE));
218*eb293b8fSAndroid Build Coastguard Worker 
219*eb293b8fSAndroid Build Coastguard Worker   ASSERT_NO_FATAL_FAILURE(Fork());
220*eb293b8fSAndroid Build Coastguard Worker 
221*eb293b8fSAndroid Build Coastguard Worker   ASSERT_EQ(0, munmap(mapping, 2 * page_size));
222*eb293b8fSAndroid Build Coastguard Worker 
223*eb293b8fSAndroid Build Coastguard Worker   // We know that process_vm_readv of a mprotect'd PROT_NONE region will fail.
224*eb293b8fSAndroid Build Coastguard Worker   // Read from the PROT_NONE area first to force the choice of ptrace.
225*eb293b8fSAndroid Build Coastguard Worker   MemoryRemote remote_ptrace(pid_);
226*eb293b8fSAndroid Build Coastguard Worker   uint32_t value;
227*eb293b8fSAndroid Build Coastguard Worker   size_t bytes = remote_ptrace.Read(reinterpret_cast<uint64_t>(mapping), &value, sizeof(value));
228*eb293b8fSAndroid Build Coastguard Worker   ASSERT_EQ(sizeof(value), bytes);
229*eb293b8fSAndroid Build Coastguard Worker   ASSERT_EQ(0xfcfcfcfcU, value);
230*eb293b8fSAndroid Build Coastguard Worker   bytes = remote_ptrace.Read(reinterpret_cast<uint64_t>(mapping) + page_size, &value, sizeof(value));
231*eb293b8fSAndroid Build Coastguard Worker   ASSERT_EQ(sizeof(value), bytes);
232*eb293b8fSAndroid Build Coastguard Worker   ASSERT_EQ(0xfcfcfcfcU, value);
233*eb293b8fSAndroid Build Coastguard Worker   bytes = remote_ptrace.Read(reinterpret_cast<uint64_t>(mapping), &value, sizeof(value));
234*eb293b8fSAndroid Build Coastguard Worker   ASSERT_EQ(sizeof(value), bytes);
235*eb293b8fSAndroid Build Coastguard Worker   ASSERT_EQ(0xfcfcfcfcU, value);
236*eb293b8fSAndroid Build Coastguard Worker 
237*eb293b8fSAndroid Build Coastguard Worker   // Now verify that choosing process_vm_readv results in failing reads of
238*eb293b8fSAndroid Build Coastguard Worker   // the PROT_NONE part of the map. Read from a valid map first which
239*eb293b8fSAndroid Build Coastguard Worker   // should prefer process_vm_readv, and keep that as the read function.
240*eb293b8fSAndroid Build Coastguard Worker   MemoryRemote remote_readv(pid_);
241*eb293b8fSAndroid Build Coastguard Worker   bytes = remote_readv.Read(reinterpret_cast<uint64_t>(mapping) + page_size, &value, sizeof(value));
242*eb293b8fSAndroid Build Coastguard Worker   ASSERT_EQ(sizeof(value), bytes);
243*eb293b8fSAndroid Build Coastguard Worker   ASSERT_EQ(0xfcfcfcfcU, value);
244*eb293b8fSAndroid Build Coastguard Worker   bytes = remote_readv.Read(reinterpret_cast<uint64_t>(mapping), &value, sizeof(value));
245*eb293b8fSAndroid Build Coastguard Worker   ASSERT_EQ(0U, bytes);
246*eb293b8fSAndroid Build Coastguard Worker   bytes = remote_readv.Read(reinterpret_cast<uint64_t>(mapping) + page_size, &value, sizeof(value));
247*eb293b8fSAndroid Build Coastguard Worker   ASSERT_EQ(sizeof(value), bytes);
248*eb293b8fSAndroid Build Coastguard Worker   ASSERT_EQ(0xfcfcfcfcU, value);
249*eb293b8fSAndroid Build Coastguard Worker }
250*eb293b8fSAndroid Build Coastguard Worker 
251*eb293b8fSAndroid Build Coastguard Worker }  // namespace unwindstack
252