1 //
2 // Copyright (C) 2012 The Android Open Source Project
3 //
4 // Licensed under the Apache License, Version 2.0 (the "License");
5 // you may not use this file except in compliance with the License.
6 // You may obtain a copy of the License at
7 //
8 // http://www.apache.org/licenses/LICENSE-2.0
9 //
10 // Unless required by applicable law or agreed to in writing, software
11 // distributed under the License is distributed on an "AS IS" BASIS,
12 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 // See the License for the specific language governing permissions and
14 // limitations under the License.
15 //
16
17 #ifndef UPDATE_ENGINE_COMMON_UTILS_H_
18 #define UPDATE_ENGINE_COMMON_UTILS_H_
19
20 #include <errno.h>
21 #include <sys/types.h>
22 #include <time.h>
23 #include <unistd.h>
24
25 #include <algorithm>
26 #include <limits>
27 #include <map>
28 #include <memory>
29 #include <set>
30 #include <string>
31 #include <vector>
32
33 #include <android-base/strings.h>
34 #include <base/files/file_path.h>
35 #include <base/posix/eintr_wrapper.h>
36 #include <base/strings/string_number_conversions.h>
37 #include <base/time/time.h>
38 #include <brillo/key_value_store.h>
39 #include <brillo/secure_blob.h>
40
41 #include "android-base/mapped_file.h"
42 #include "android-base/scopeguard.h"
43 #include "google/protobuf/repeated_field.h"
44 #include "update_engine/common/action.h"
45 #include "update_engine/common/action_processor.h"
46 #include "update_engine/common/constants.h"
47 #include "update_engine/payload_consumer/file_descriptor.h"
48 #include "update_engine/update_metadata.pb.h"
49
50 namespace chromeos_update_engine {
51
52 namespace utils {
53
54 // Formats |vec_str| as a string of the form ["<elem1>", "<elem2>"].
55 // Does no escaping, only use this for presentation in error messages.
56 std::string StringVectorToString(const std::vector<std::string>& vec_str);
57
58 // Calculates the p2p file id from payload hash and size
59 std::string CalculateP2PFileId(const brillo::Blob& payload_hash,
60 size_t payload_size);
61
62 // Writes the data passed to path. The file at path will be overwritten if it
63 // exists. Returns true on success, false otherwise.
64 bool WriteFile(const char* path, const void* data, size_t data_len);
65
66 // Calls write() or pwrite() repeatedly until all count bytes at buf are
67 // written to fd or an error occurs. Returns true on success.
68 bool WriteAll(int fd, const void* buf, size_t count);
69 bool PWriteAll(int fd, const void* buf, size_t count, off_t offset);
70
71 bool WriteAll(FileDescriptor* fd, const void* buf, size_t count);
72
WriteAll(const FileDescriptorPtr & fd,const void * buf,size_t count)73 constexpr bool WriteAll(const FileDescriptorPtr& fd,
74 const void* buf,
75 size_t count) {
76 return WriteAll(fd.get(), buf, count);
77 }
78 // WriteAll writes data at specified offset, but it modifies file position.
79 bool WriteAll(FileDescriptorPtr* fd, const void* buf, size_t count, off_t off);
80
81 // https://man7.org/linux/man-pages/man2/pread.2.html
82 // PWriteAll writes data at specified offset, but it DOES NOT modify file
83 // position. Behaves similar to linux' pwrite syscall.
84 bool PWriteAll(const FileDescriptorPtr& fd,
85 const void* buf,
86 size_t count,
87 off_t offset);
88
89 // Calls read() repeatedly until |count| bytes are read or EOF or EWOULDBLOCK
90 // is reached. Returns whether all read() calls succeeded (including EWOULDBLOCK
91 // as a success case), sets |eof| to whether the eof was reached and sets
92 // |out_bytes_read| to the actual number of bytes read regardless of the return
93 // value.
94 bool ReadAll(
95 int fd, void* buf, size_t count, size_t* out_bytes_read, bool* eof);
96
97 // Calls pread() repeatedly until count bytes are read, or EOF is reached.
98 // Returns number of bytes read in *bytes_read. Returns true on success.
99 bool PReadAll(
100 int fd, void* buf, size_t count, off_t offset, ssize_t* out_bytes_read);
101
102 // Reads data at specified offset, this function does change file position.
103
104 bool ReadAll(FileDescriptor* fd,
105 void* buf,
106 size_t count,
107 off_t offset,
108 ssize_t* out_bytes_read);
109
ReadAll(const FileDescriptorPtr & fd,void * buf,size_t count,off_t offset,ssize_t * out_bytes_read)110 constexpr bool ReadAll(const FileDescriptorPtr& fd,
111 void* buf,
112 size_t count,
113 off_t offset,
114 ssize_t* out_bytes_read) {
115 return ReadAll(fd.get(), buf, count, offset, out_bytes_read);
116 }
117
118 // https://man7.org/linux/man-pages/man2/pread.2.html
119 // Reads data at specified offset, this function DOES NOT change file position.
120 // Behavior is similar to linux's pread syscall.
121 bool PReadAll(FileDescriptor* fd,
122 void* buf,
123 size_t count,
124 off_t offset,
125 ssize_t* out_bytes_read);
126
PReadAll(const FileDescriptorPtr & fd,void * buf,size_t count,off_t offset,ssize_t * out_bytes_read)127 constexpr bool PReadAll(const FileDescriptorPtr& fd,
128 void* buf,
129 size_t count,
130 off_t offset,
131 ssize_t* out_bytes_read) {
132 return PReadAll(fd.get(), buf, count, offset, out_bytes_read);
133 }
134
135 // Opens |path| for reading and appends its entire content to the container
136 // pointed to by |out_p|. Returns true upon successfully reading all of the
137 // file's content, false otherwise, in which case the state of the output
138 // container is unknown. ReadFileChunk starts reading the file from |offset|; if
139 // |size| is not -1, only up to |size| bytes are read in.
140 bool ReadFile(const std::string& path, brillo::Blob* out_p);
141 bool ReadFile(const std::string& path, std::string* out_p);
142 bool ReadFileChunk(const std::string& path,
143 off_t offset,
144 off_t size,
145 brillo::Blob* out_p);
146
147 // Invokes |cmd| in a pipe and appends its stdout to the container pointed to by
148 // |out_p|. Returns true upon successfully reading all of the output, false
149 // otherwise, in which case the state of the output container is unknown.
150 bool ReadPipe(const std::string& cmd, std::string* out_p);
151
152 // Returns the size of the block device at the file descriptor fd. If an error
153 // occurs, -1 is returned.
154 off_t BlockDevSize(int fd);
155
156 // Returns the size of the file at path, or the file descriptor fd. If the file
157 // is actually a block device, this function will automatically call
158 // BlockDevSize. If the file doesn't exist or some error occurrs, -1 is
159 // returned.
160 off_t FileSize(const std::string& path);
161 off_t FileSize(int fd);
162
163 bool SendFile(int out_fd, int in_fd, size_t count);
164
165 // Returns true if the file exists for sure. Returns false if it doesn't exist,
166 // or an error occurs.
167 bool FileExists(const char* path);
168
169 // Returns true if |path| exists and is a symbolic link.
170 bool IsSymlink(const char* path);
171
172 // Return true iff |path| exists and is a regular file
173 bool IsRegFile(const char* path);
174
175 // If |base_filename_template| is neither absolute (starts with "/") nor
176 // explicitly relative to the current working directory (starts with "./" or
177 // "../"), then it is prepended the system's temporary directory. On success,
178 // stores the name of the new temporary file in |filename|. If |fd| is
179 // non-null, the file descriptor returned by mkstemp is written to it and
180 // kept open; otherwise, it is closed. The template must end with "XXXXXX".
181 // Returns true on success.
182 bool MakeTempFile(const std::string& base_filename_template,
183 std::string* filename,
184 int* fd);
185
186 // Splits the partition device name into the block device name and partition
187 // number. For example, "/dev/sda3" will be split into {"/dev/sda", 3} and
188 // "/dev/mmcblk0p2" into {"/dev/mmcblk0", 2}
189 // Returns false when malformed device name is passed in.
190 // If both output parameters are omitted (null), can be used
191 // just to test the validity of the device name. Note that the function
192 // simply checks if the device name looks like a valid device, no other
193 // checks are performed (i.e. it doesn't check if the device actually exists).
194 bool SplitPartitionName(const std::string& partition_name,
195 std::string* out_disk_name,
196 int* out_partition_num);
197
198 // Builds a partition device name from the block device name and partition
199 // number. For example:
200 // {"/dev/sda", 1} => "/dev/sda1"
201 // {"/dev/mmcblk2", 12} => "/dev/mmcblk2p12"
202 // Returns empty string when invalid parameters are passed in
203 std::string MakePartitionName(const std::string& disk_name, int partition_num);
204
205 // Set the read-only attribute on the block device |device| to the value passed
206 // in |read_only|. Return whether the operation succeeded.
207 bool SetBlockDeviceReadOnly(const std::string& device, bool read_only);
208
209 // Synchronously mount or unmount a filesystem. Return true on success.
210 // When mounting, it will attempt to mount the device as the passed filesystem
211 // type |type|, with the passed |flags| options. If |type| is empty, "ext2",
212 // "ext3", "ext4" and "squashfs" will be tried.
213 bool MountFilesystem(const std::string& device,
214 const std::string& mountpoint,
215 unsigned long flags, // NOLINT(runtime/int)
216 const std::string& type,
217 const std::string& fs_mount_options);
218 bool UnmountFilesystem(const std::string& mountpoint);
219
220 // Return whether the passed |mountpoint| path is a directory where a filesystem
221 // is mounted. Due to detection mechanism limitations, when used on directories
222 // where another part of the tree was bind mounted returns true only if bind
223 // mounted on top of a different filesystem (not inside the same filesystem).
224 bool IsMountpoint(const std::string& mountpoint);
225
226 // Returns a human-readable string with the file format based on magic constants
227 // on the header of the file.
228 std::string GetFileFormat(const std::string& path);
229
230 // Returns the string representation of the given UTC time.
231 // such as "11/14/2011 14:05:30 GMT".
232 std::string ToString(const base::Time utc_time);
233
234 // Returns true or false depending on the value of b.
235 std::string ToString(bool b);
236
237 // Returns a string representation of the given enum.
238 std::string ToString(DownloadSource source);
239
240 // Returns a string representation of the given enum.
241 std::string ToString(PayloadType payload_type);
242
243 // Fuzzes an integer |value| randomly in the range:
244 // [value - range / 2, value + range - range / 2]
245 int FuzzInt(int value, unsigned int range);
246
247 // Log a string in hex to LOG(INFO). Useful for debugging.
248 void HexDumpArray(const uint8_t* const arr, const size_t length);
HexDumpString(const std::string & str)249 inline void HexDumpString(const std::string& str) {
250 HexDumpArray(reinterpret_cast<const uint8_t*>(str.data()), str.size());
251 }
HexDumpVector(const brillo::Blob & vect)252 inline void HexDumpVector(const brillo::Blob& vect) {
253 HexDumpArray(vect.data(), vect.size());
254 }
255
256 template <typename T>
VectorIndexOf(const std::vector<T> & vect,const T & value,typename std::vector<T>::size_type * out_index)257 bool VectorIndexOf(const std::vector<T>& vect,
258 const T& value,
259 typename std::vector<T>::size_type* out_index) {
260 typename std::vector<T>::const_iterator it =
261 std::find(vect.begin(), vect.end(), value);
262 if (it == vect.end()) {
263 return false;
264 } else {
265 *out_index = it - vect.begin();
266 return true;
267 }
268 }
269
270 // Return the total number of blocks in the passed |extents| collection.
271 template <class T>
BlocksInExtents(const T & extents)272 uint64_t BlocksInExtents(const T& extents) {
273 uint64_t sum = 0;
274 for (const auto& ext : extents) {
275 sum += ext.num_blocks();
276 }
277 return sum;
278 }
279
280 // Converts seconds into human readable notation including days, hours, minutes
281 // and seconds. For example, 185 will yield 3m5s, 4300 will yield 1h11m40s, and
282 // 360000 will yield 4d4h0m0s. Zero padding not applied. Seconds are always
283 // shown in the result.
284 std::string FormatSecs(unsigned secs);
285
286 // Converts a TimeDelta into human readable notation including days, hours,
287 // minutes, seconds and fractions of a second down to microsecond granularity,
288 // as necessary; for example, an output of 5d2h0m15.053s means that the input
289 // time was precise to the milliseconds only. Zero padding not applied, except
290 // for fractions. Seconds are always shown, but fractions thereof are only shown
291 // when applicable. If |delta| is negative, the output will have a leading '-'
292 // followed by the absolute duration.
293 std::string FormatTimeDelta(base::TimeDelta delta);
294
295 // This method transforms the given error code to be suitable for UMA and
296 // for error classification purposes by removing the higher order bits and
297 // aggregating error codes beyond the enum range, etc. This method is
298 // idempotent, i.e. if called with a value previously returned by this method,
299 // it'll return the same value again.
300 ErrorCode GetBaseErrorCode(ErrorCode code);
301
302 // Converts |time| to an Omaha InstallDate which is defined as "the
303 // number of PST8PDT calendar weeks since Jan 1st 2007 0:00 PST, times
304 // seven" with PST8PDT defined as "Pacific Time" (e.g. UTC-07:00 if
305 // daylight savings is observed and UTC-08:00 otherwise.)
306 //
307 // If the passed in |time| variable is before Monday January 1st 2007
308 // 0:00 PST, False is returned and the value returned in
309 // |out_num_days| is undefined. Otherwise the number of PST8PDT
310 // calendar weeks since that date times seven is returned in
311 // |out_num_days| and the function returns True.
312 //
313 // (NOTE: This function does not currently take daylight savings time
314 // into account so the result may up to one hour off. This is because
315 // the glibc date and timezone routines depend on the TZ environment
316 // variable and changing environment variables is not thread-safe.
317 bool ConvertToOmahaInstallDate(base::Time time, int* out_num_days);
318
319 // Look for the minor version value in the passed |store| and set
320 // |minor_version| to that value. Return whether the value was found and valid.
321 bool GetMinorVersion(const brillo::KeyValueStore& store,
322 uint32_t* minor_version);
323
324 // This function reads the specified data in |extents| into |out_data|. The
325 // extents are read from the file at |path|. |out_data_size| is the size of
326 // |out_data|. Returns false if the number of bytes to read given in
327 // |extents| does not equal |out_data_size|.
328 bool ReadExtents(const std::string& path,
329 const std::vector<Extent>& extents,
330 brillo::Blob* out_data,
331 ssize_t out_data_size,
332 size_t block_size);
333
334 bool ReadExtents(FileDescriptorPtr path,
335 const std::vector<Extent>& extents,
336 brillo::Blob* out_data,
337 ssize_t out_data_size,
338 size_t block_size);
339
340 bool WriteExtents(const std::string& path,
341 const google::protobuf::RepeatedPtrField<Extent>& extents,
342 const brillo::Blob& data,
343 size_t block_size);
344
ReadExtents(const std::string & path,const std::vector<Extent> & extents,brillo::Blob * out_data,size_t block_size)345 constexpr bool ReadExtents(const std::string& path,
346 const std::vector<Extent>& extents,
347 brillo::Blob* out_data,
348 size_t block_size) {
349 return ReadExtents(path,
350 extents,
351 out_data,
352 utils::BlocksInExtents(extents) * block_size,
353 block_size);
354 }
355
356 bool ReadExtents(const std::string& path,
357 const google::protobuf::RepeatedPtrField<Extent>& extents,
358 brillo::Blob* out_data,
359 size_t block_size);
360
361 bool ReadExtents(FileDescriptorPtr path,
362 const google::protobuf::RepeatedPtrField<Extent>& extents,
363 brillo::Blob* out_data,
364 size_t block_size);
365
366 // Read the current boot identifier and store it in |boot_id|. This identifier
367 // is constants during the same boot of the kernel and is regenerated after
368 // reboot. Returns whether it succeeded getting the boot_id.
369 bool GetBootId(std::string* boot_id);
370
371 // Gets a string value from the vpd for a given key using the `vpd_get_value`
372 // shell command. Returns true on success.
373 bool GetVpdValue(std::string key, std::string* result);
374
375 // This function gets the file path of the file pointed to by FileDiscriptor.
376 std::string GetFilePath(int fd);
377
378 // Divide |x| by |y| and round up to the nearest integer.
DivRoundUp(uint64_t x,uint64_t y)379 constexpr uint64_t DivRoundUp(uint64_t x, uint64_t y) {
380 return (x + y - 1) / y;
381 }
382
383 // Round |x| up to be a multiple of |y|.
RoundUp(uint64_t x,uint64_t y)384 constexpr uint64_t RoundUp(uint64_t x, uint64_t y) {
385 return DivRoundUp(x, y) * y;
386 }
387
388 // Returns the integer value of the first section of |version|. E.g. for
389 // "10575.39." returns 10575. Returns 0 if |version| is empty, returns -1 if
390 // first section of |version| is invalid (e.g. not a number).
391 int VersionPrefix(const std::string& version);
392
393 // Parses a string in the form high.low, where high and low are 16 bit unsigned
394 // integers. If there is more than 1 dot, or if either of the two parts are
395 // not valid 16 bit unsigned numbers, then 0xffff is returned for both.
396 void ParseRollbackKeyVersion(const std::string& raw_version,
397 uint16_t* high_version,
398 uint16_t* low_version);
399
400 // Return a string representation of |utime| for log file names.
401 std::string GetTimeAsString(time_t utime);
402 // Returns the string format of the hashed |str_to_convert| that can be used
403 // with |Excluder| as the exclusion name.
404 std::string GetExclusionName(const std::string& str_to_convert);
405
406 // Parse `old_version` and `new_version` as integer timestamps and
407 // Return kSuccess if `new_version` is larger/newer.
408 // Return kSuccess if either one is empty.
409 // Return kError if |old_version| is not empty and not an integer.
410 // Return kDownloadManifestParseError if |new_version| is not empty and not an
411 // integer.
412 // Return kPayloadTimestampError if both are integers but |new_version| <
413 // |old_version|.
414 ErrorCode IsTimestampNewer(const std::string_view old_version,
415 const std::string_view new_version);
416
417 std::unique_ptr<android::base::MappedFile> GetReadonlyZeroBlock(size_t size);
418
419 std::string_view GetReadonlyZeroString(size_t size);
420
421 } // namespace utils
422
423 // Utility class to close a file descriptor
424 class ScopedFdCloser {
425 public:
ScopedFdCloser(int * fd)426 explicit ScopedFdCloser(int* fd) : fd_(fd) {}
~ScopedFdCloser()427 ~ScopedFdCloser() {
428 if (should_close_ && fd_ && (*fd_ >= 0) && !IGNORE_EINTR(close(*fd_)))
429 *fd_ = -1;
430 }
set_should_close(bool should_close)431 void set_should_close(bool should_close) { should_close_ = should_close; }
432
433 private:
434 int* fd_;
435 bool should_close_ = true;
436 DISALLOW_COPY_AND_ASSIGN(ScopedFdCloser);
437 };
438
439 // Utility class to delete a file when it goes out of scope.
440 class ScopedPathUnlinker {
441 public:
ScopedPathUnlinker(const std::string & path)442 explicit ScopedPathUnlinker(const std::string& path)
443 : path_(path), should_remove_(true) {}
~ScopedPathUnlinker()444 ~ScopedPathUnlinker() {
445 if (should_remove_ && unlink(path_.c_str()) < 0) {
446 PLOG(ERROR) << "Unable to unlink path " << path_;
447 }
448 }
set_should_remove(bool should_remove)449 void set_should_remove(bool should_remove) { should_remove_ = should_remove; }
450
451 private:
452 const std::string path_;
453 bool should_remove_;
454 DISALLOW_COPY_AND_ASSIGN(ScopedPathUnlinker);
455 };
456
457 class ScopedTempFile {
458 public:
ScopedTempFile()459 ScopedTempFile() : ScopedTempFile("update_engine_temp.XXXXXX") {}
460
461 // If |open_fd| is true, a writable file descriptor will be opened for this
462 // file.
463 // If |truncate_size| is non-zero, truncate file to that size on creation.
464 explicit ScopedTempFile(const std::string& pattern,
465 bool open_fd = false,
466 size_t truncate_size = 0) {
467 CHECK(utils::MakeTempFile(pattern, &path_, open_fd ? &fd_ : nullptr));
468 unlinker_.reset(new ScopedPathUnlinker(path_));
469 if (open_fd) {
470 CHECK_GE(fd_, 0);
471 fd_closer_.reset(new ScopedFdCloser(&fd_));
472 }
473 if (truncate_size > 0) {
474 CHECK_EQ(0, truncate(path_.c_str(), truncate_size));
475 }
476 }
477 virtual ~ScopedTempFile() = default;
478
path()479 const std::string& path() const { return path_; }
fd()480 int fd() const {
481 CHECK(fd_closer_);
482 return fd_;
483 }
CloseFd()484 void CloseFd() {
485 CHECK(fd_closer_);
486 fd_closer_.reset();
487 }
488
489 private:
490 std::string path_;
491 std::unique_ptr<ScopedPathUnlinker> unlinker_;
492
493 int fd_{-1};
494 std::unique_ptr<ScopedFdCloser> fd_closer_;
495
496 DISALLOW_COPY_AND_ASSIGN(ScopedTempFile);
497 };
498
499 // A little object to call ActionComplete on the ActionProcessor when
500 // it's destructed.
501 class ScopedActionCompleter {
502 public:
ScopedActionCompleter(ActionProcessor * processor,AbstractAction * action)503 explicit ScopedActionCompleter(ActionProcessor* processor,
504 AbstractAction* action)
505 : processor_(processor),
506 action_(action),
507 code_(ErrorCode::kError),
508 should_complete_(true) {
509 CHECK(processor_);
510 }
~ScopedActionCompleter()511 ~ScopedActionCompleter() {
512 if (should_complete_)
513 processor_->ActionComplete(action_, code_);
514 }
set_code(ErrorCode code)515 void set_code(ErrorCode code) { code_ = code; }
set_should_complete(bool should_complete)516 void set_should_complete(bool should_complete) {
517 should_complete_ = should_complete;
518 }
get_code()519 ErrorCode get_code() const { return code_; }
520
521 private:
522 ActionProcessor* processor_;
523 AbstractAction* action_;
524 ErrorCode code_;
525 bool should_complete_;
526 DISALLOW_COPY_AND_ASSIGN(ScopedActionCompleter);
527 };
528
529 // Simple wrapper for creating a slice of some container,
530 // similar to string_view but for other containers.
531 template <typename T>
532 struct Range {
RangeRange533 Range(T t1, T t2) : t1_(t1), t2_(t2) {}
beginRange534 constexpr auto begin() const noexcept { return t1_; }
endRange535 constexpr auto end() const noexcept { return t2_; }
536 T t1_;
537 T t2_;
538 };
539
540 std::string HexEncode(const brillo::Blob& blob) noexcept;
541 std::string HexEncode(const std::string_view blob) noexcept;
542
543 template <size_t kSize>
HexEncode(const std::array<uint8_t,kSize> blob)544 std::string HexEncode(const std::array<uint8_t, kSize> blob) noexcept {
545 return base::HexEncode(blob.data(), blob.size());
546 }
547
548 [[nodiscard]] std::string_view ToStringView(
549 const std::vector<unsigned char>& blob) noexcept;
550
ToStringView(const std::vector<char> & blob)551 constexpr std::string_view ToStringView(
552 const std::vector<char>& blob) noexcept {
553 return std::string_view{blob.data(), blob.size()};
554 }
555
556 [[nodiscard]] std::string_view ToStringView(const void* data,
557 size_t size) noexcept;
558
559 } // namespace chromeos_update_engine
560
561 #define TEST_AND_RETURN_FALSE_ERRNO(_x) \
562 do { \
563 bool _success = static_cast<bool>(_x); \
564 if (!_success) { \
565 std::string _msg = android::base::ErrnoNumberAsString(errno); \
566 LOG(ERROR) << #_x " failed: " << _msg; \
567 return false; \
568 } \
569 } while (0)
570
571 #define TEST_AND_RETURN_FALSE(_x) \
572 do { \
573 bool _success = static_cast<bool>(_x); \
574 if (!_success) { \
575 LOG(ERROR) << #_x " failed."; \
576 return false; \
577 } \
578 } while (0)
579
580 #define TEST_AND_RETURN_ERRNO(_x) \
581 do { \
582 bool _success = static_cast<bool>(_x); \
583 if (!_success) { \
584 std::string _msg = android::base::ErrnoNumberAsString(errno); \
585 LOG(ERROR) << #_x " failed: " << _msg; \
586 return; \
587 } \
588 } while (0)
589
590 #define TEST_AND_RETURN(_x) \
591 do { \
592 bool _success = static_cast<bool>(_x); \
593 if (!_success) { \
594 LOG(ERROR) << #_x " failed."; \
595 return; \
596 } \
597 } while (0)
598
599 #define TEST_AND_RETURN_FALSE_ERRCODE(_x) \
600 do { \
601 errcode_t _error = (_x); \
602 if (_error) { \
603 errno = _error; \
604 LOG(ERROR) << #_x " failed: " << _error; \
605 return false; \
606 } \
607 } while (0)
608
609 #define TEST_OP(_x, _y, op) \
610 do { \
611 const auto& x = _x; \
612 const auto& y = _y; \
613 if (!(x op y)) { \
614 LOG(ERROR) << #_x " " #op " " #_y << " failed: " << x << " " #op " " \
615 << y; \
616 return {}; \
617 } \
618 } while (0)
619
620 #define TEST_EQ(_x, _y) TEST_OP(_x, _y, ==)
621 #define TEST_NE(_x, _y) TEST_OP(_x, _y, !=)
622 #define TEST_LE(_x, _y) TEST_OP(_x, _y, <=)
623 #define TEST_GE(_x, _y) TEST_OP(_x, _y, >=)
624 #define TEST_LT(_x, _y) TEST_OP(_x, _y, <)
625 #define TEST_GT(_x, _y) TEST_OP(_x, _y, >)
626
627 // Macro for running a block of code before function exits.
628 // Example:
629 // DEFER {
630 // fclose(hc);
631 // hc = nullptr;
632 // };
633 // It works by creating a new local variable struct holding the lambda, the
634 // destructor of that struct will invoke the lambda.
635
636 constexpr struct {
637 template <typename F>
638 constexpr auto operator<<(F&& f) const noexcept {
639 return android::base::make_scope_guard(std::forward<F>(f));
640 }
641 } deferrer;
642
643 #define TOKENPASTE(x, y) x##y
644 #define DEFER \
645 auto TOKENPASTE(_deferred_lambda_call, __COUNTER__) = deferrer \
646 << [&]() mutable
647
648 #endif // UPDATE_ENGINE_COMMON_UTILS_H_
649