1 //
2 // Copyright (C) 2012 The Android Open Source Project
3 //
4 // Licensed under the Apache License, Version 2.0 (the "License");
5 // you may not use this file except in compliance with the License.
6 // You may obtain a copy of the License at
7 //
8 // http://www.apache.org/licenses/LICENSE-2.0
9 //
10 // Unless required by applicable law or agreed to in writing, software
11 // distributed under the License is distributed on an "AS IS" BASIS,
12 // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 // See the License for the specific language governing permissions and
14 // limitations under the License.
15 //
16
17 #ifndef UPDATE_ENGINE_COMMON_UTILS_H_
18 #define UPDATE_ENGINE_COMMON_UTILS_H_
19
20 #include <errno.h>
21 #include <sys/types.h>
22 #include <time.h>
23 #include <unistd.h>
24
25 #include <algorithm>
26 #include <limits>
27 #include <map>
28 #include <memory>
29 #include <set>
30 #include <string>
31 #include <vector>
32
33 #include <android-base/strings.h>
34 #include <base/files/file_path.h>
35 #include <base/posix/eintr_wrapper.h>
36 #include <base/strings/string_number_conversions.h>
37 #include <base/time/time.h>
38 #include <brillo/key_value_store.h>
39 #include <brillo/secure_blob.h>
40
41 #include "android-base/mapped_file.h"
42 #include "android-base/scopeguard.h"
43 #include "google/protobuf/repeated_field.h"
44 #include "update_engine/common/action.h"
45 #include "update_engine/common/action_processor.h"
46 #include "update_engine/common/constants.h"
47 #include "update_engine/payload_consumer/file_descriptor.h"
48 #include "update_engine/update_metadata.pb.h"
49
50 namespace chromeos_update_engine {
51
52 namespace utils {
53
54 // Formats |vec_str| as a string of the form ["<elem1>", "<elem2>"].
55 // Does no escaping, only use this for presentation in error messages.
56 std::string StringVectorToString(const std::vector<std::string>& vec_str);
57
58 // Calculates the p2p file id from payload hash and size
59 std::string CalculateP2PFileId(const brillo::Blob& payload_hash,
60 size_t payload_size);
61
62 // Writes the data passed to path. The file at path will be overwritten if it
63 // exists. Returns true on success, false otherwise.
64 bool WriteFile(const char* path, const void* data, size_t data_len);
65
66 // Calls write() or pwrite() repeatedly until all count bytes at buf are
67 // written to fd or an error occurs. Returns true on success.
68 bool WriteAll(int fd, const void* buf, size_t count);
69 bool PWriteAll(int fd, const void* buf, size_t count, off_t offset);
70
71 bool WriteAll(FileDescriptor* fd, const void* buf, size_t count);
72
WriteAll(const FileDescriptorPtr & fd,const void * buf,size_t count)73 constexpr bool WriteAll(const FileDescriptorPtr& fd,
74 const void* buf,
75 size_t count) {
76 return WriteAll(fd.get(), buf, count);
77 }
78 // WriteAll writes data at specified offset, but it modifies file position.
79 bool WriteAll(FileDescriptorPtr* fd, const void* buf, size_t count, off_t off);
80
81 // https://man7.org/linux/man-pages/man2/pread.2.html
82 // PWriteAll writes data at specified offset, but it DOES NOT modify file
83 // position. Behaves similar to linux' pwrite syscall.
84 bool PWriteAll(const FileDescriptorPtr& fd,
85 const void* buf,
86 size_t count,
87 off_t offset);
88
89 // Calls read() repeatedly until |count| bytes are read or EOF or EWOULDBLOCK
90 // is reached. Returns whether all read() calls succeeded (including EWOULDBLOCK
91 // as a success case), sets |eof| to whether the eof was reached and sets
92 // |out_bytes_read| to the actual number of bytes read regardless of the return
93 // value.
94 bool ReadAll(
95 int fd, void* buf, size_t count, size_t* out_bytes_read, bool* eof);
96
97 // Calls pread() repeatedly until count bytes are read, or EOF is reached.
98 // Returns number of bytes read in *bytes_read. Returns true on success.
99 bool PReadAll(
100 int fd, void* buf, size_t count, off_t offset, ssize_t* out_bytes_read);
101
102 // Reads data at specified offset, this function does change file position.
103
104 bool ReadAll(FileDescriptor* fd,
105 void* buf,
106 size_t count,
107 off_t offset,
108 ssize_t* out_bytes_read);
109
ReadAll(const FileDescriptorPtr & fd,void * buf,size_t count,off_t offset,ssize_t * out_bytes_read)110 constexpr bool ReadAll(const FileDescriptorPtr& fd,
111 void* buf,
112 size_t count,
113 off_t offset,
114 ssize_t* out_bytes_read) {
115 return ReadAll(fd.get(), buf, count, offset, out_bytes_read);
116 }
117
118 // https://man7.org/linux/man-pages/man2/pread.2.html
119 // Reads data at specified offset, this function DOES NOT change file position.
120 // Behavior is similar to linux's pread syscall.
121 bool PReadAll(FileDescriptor* fd,
122 void* buf,
123 size_t count,
124 off_t offset,
125 ssize_t* out_bytes_read);
126
PReadAll(const FileDescriptorPtr & fd,void * buf,size_t count,off_t offset,ssize_t * out_bytes_read)127 constexpr bool PReadAll(const FileDescriptorPtr& fd,
128 void* buf,
129 size_t count,
130 off_t offset,
131 ssize_t* out_bytes_read) {
132 return PReadAll(fd.get(), buf, count, offset, out_bytes_read);
133 }
134
135 // Opens |path| for reading and appends its entire content to the container
136 // pointed to by |out_p|. Returns true upon successfully reading all of the
137 // file's content, false otherwise, in which case the state of the output
138 // container is unknown. ReadFileChunk starts reading the file from |offset|; if
139 // |size| is not -1, only up to |size| bytes are read in.
140 bool ReadFile(const std::string& path, brillo::Blob* out_p);
141 bool ReadFile(const std::string& path, std::string* out_p);
142 bool ReadFileChunk(const std::string& path,
143 off_t offset,
144 off_t size,
145 brillo::Blob* out_p);
146
147 // Invokes |cmd| in a pipe and appends its stdout to the container pointed to by
148 // |out_p|. Returns true upon successfully reading all of the output, false
149 // otherwise, in which case the state of the output container is unknown.
150 bool ReadPipe(const std::string& cmd, std::string* out_p);
151
152 // Returns the size of the block device at the file descriptor fd. If an error
153 // occurs, -1 is returned.
154 off_t BlockDevSize(int fd);
155
156 // Returns the size of the file at path, or the file descriptor fd. If the file
157 // is actually a block device, this function will automatically call
158 // BlockDevSize. If the file doesn't exist or some error occurrs, -1 is
159 // returned.
160 off_t FileSize(const std::string& path);
161 off_t FileSize(int fd);
162
163 bool SendFile(int out_fd, int in_fd, size_t count);
164
165 bool FsyncDirectory(const char* dirname);
166 bool WriteStringToFileAtomic(const std::string& path, std::string_view content);
167
168 // Returns true if the file exists for sure. Returns false if it doesn't exist,
169 // or an error occurs.
170 bool FileExists(const char* path);
171
172 // Returns true if |path| exists and is a symbolic link.
173 bool IsSymlink(const char* path);
174
175 // Return true iff |path| exists and is a regular file
176 bool IsRegFile(const char* path);
177
178 // If |base_filename_template| is neither absolute (starts with "/") nor
179 // explicitly relative to the current working directory (starts with "./" or
180 // "../"), then it is prepended the system's temporary directory. On success,
181 // stores the name of the new temporary file in |filename|. If |fd| is
182 // non-null, the file descriptor returned by mkstemp is written to it and
183 // kept open; otherwise, it is closed. The template must end with "XXXXXX".
184 // Returns true on success.
185 bool MakeTempFile(const std::string& base_filename_template,
186 std::string* filename,
187 int* fd);
188
189 // Splits the partition device name into the block device name and partition
190 // number. For example, "/dev/sda3" will be split into {"/dev/sda", 3} and
191 // "/dev/mmcblk0p2" into {"/dev/mmcblk0", 2}
192 // Returns false when malformed device name is passed in.
193 // If both output parameters are omitted (null), can be used
194 // just to test the validity of the device name. Note that the function
195 // simply checks if the device name looks like a valid device, no other
196 // checks are performed (i.e. it doesn't check if the device actually exists).
197 bool SplitPartitionName(const std::string& partition_name,
198 std::string* out_disk_name,
199 int* out_partition_num);
200
201 // Builds a partition device name from the block device name and partition
202 // number. For example:
203 // {"/dev/sda", 1} => "/dev/sda1"
204 // {"/dev/mmcblk2", 12} => "/dev/mmcblk2p12"
205 // Returns empty string when invalid parameters are passed in
206 std::string MakePartitionName(const std::string& disk_name, int partition_num);
207
208 // Set the read-only attribute on the block device |device| to the value passed
209 // in |read_only|. Return whether the operation succeeded.
210 bool SetBlockDeviceReadOnly(const std::string& device, bool read_only);
211
212 // Synchronously mount or unmount a filesystem. Return true on success.
213 // When mounting, it will attempt to mount the device as the passed filesystem
214 // type |type|, with the passed |flags| options. If |type| is empty, "ext2",
215 // "ext3", "ext4" and "squashfs" will be tried.
216 bool MountFilesystem(const std::string& device,
217 const std::string& mountpoint,
218 unsigned long flags, // NOLINT(runtime/int)
219 const std::string& type,
220 const std::string& fs_mount_options);
221 bool UnmountFilesystem(const std::string& mountpoint);
222
223 // Return whether the passed |mountpoint| path is a directory where a filesystem
224 // is mounted. Due to detection mechanism limitations, when used on directories
225 // where another part of the tree was bind mounted returns true only if bind
226 // mounted on top of a different filesystem (not inside the same filesystem).
227 bool IsMountpoint(const std::string& mountpoint);
228
229 // Returns a human-readable string with the file format based on magic constants
230 // on the header of the file.
231 std::string GetFileFormat(const std::string& path);
232
233 // Returns the string representation of the given UTC time.
234 // such as "11/14/2011 14:05:30 GMT".
235 std::string ToString(const base::Time utc_time);
236
237 // Returns true or false depending on the value of b.
238 std::string ToString(bool b);
239
240 // Returns a string representation of the given enum.
241 std::string ToString(DownloadSource source);
242
243 // Returns a string representation of the given enum.
244 std::string ToString(PayloadType payload_type);
245
246 // Fuzzes an integer |value| randomly in the range:
247 // [value - range / 2, value + range - range / 2]
248 int FuzzInt(int value, unsigned int range);
249
250 // Log a string in hex to LOG(INFO). Useful for debugging.
251 void HexDumpArray(const uint8_t* const arr, const size_t length);
HexDumpString(const std::string & str)252 inline void HexDumpString(const std::string& str) {
253 HexDumpArray(reinterpret_cast<const uint8_t*>(str.data()), str.size());
254 }
HexDumpVector(const brillo::Blob & vect)255 inline void HexDumpVector(const brillo::Blob& vect) {
256 HexDumpArray(vect.data(), vect.size());
257 }
258
259 template <typename T>
VectorIndexOf(const std::vector<T> & vect,const T & value,typename std::vector<T>::size_type * out_index)260 bool VectorIndexOf(const std::vector<T>& vect,
261 const T& value,
262 typename std::vector<T>::size_type* out_index) {
263 typename std::vector<T>::const_iterator it =
264 std::find(vect.begin(), vect.end(), value);
265 if (it == vect.end()) {
266 return false;
267 } else {
268 *out_index = it - vect.begin();
269 return true;
270 }
271 }
272
273 // Return the total number of blocks in the passed |extents| collection.
274 template <class T>
BlocksInExtents(const T & extents)275 uint64_t BlocksInExtents(const T& extents) {
276 uint64_t sum = 0;
277 for (const auto& ext : extents) {
278 sum += ext.num_blocks();
279 }
280 return sum;
281 }
282
283 // Converts seconds into human readable notation including days, hours, minutes
284 // and seconds. For example, 185 will yield 3m5s, 4300 will yield 1h11m40s, and
285 // 360000 will yield 4d4h0m0s. Zero padding not applied. Seconds are always
286 // shown in the result.
287 std::string FormatSecs(unsigned secs);
288
289 // Converts a TimeDelta into human readable notation including days, hours,
290 // minutes, seconds and fractions of a second down to microsecond granularity,
291 // as necessary; for example, an output of 5d2h0m15.053s means that the input
292 // time was precise to the milliseconds only. Zero padding not applied, except
293 // for fractions. Seconds are always shown, but fractions thereof are only shown
294 // when applicable. If |delta| is negative, the output will have a leading '-'
295 // followed by the absolute duration.
296 std::string FormatTimeDelta(base::TimeDelta delta);
297
298 // This method transforms the given error code to be suitable for UMA and
299 // for error classification purposes by removing the higher order bits and
300 // aggregating error codes beyond the enum range, etc. This method is
301 // idempotent, i.e. if called with a value previously returned by this method,
302 // it'll return the same value again.
303 ErrorCode GetBaseErrorCode(ErrorCode code);
304
305 // Converts |time| to an Omaha InstallDate which is defined as "the
306 // number of PST8PDT calendar weeks since Jan 1st 2007 0:00 PST, times
307 // seven" with PST8PDT defined as "Pacific Time" (e.g. UTC-07:00 if
308 // daylight savings is observed and UTC-08:00 otherwise.)
309 //
310 // If the passed in |time| variable is before Monday January 1st 2007
311 // 0:00 PST, False is returned and the value returned in
312 // |out_num_days| is undefined. Otherwise the number of PST8PDT
313 // calendar weeks since that date times seven is returned in
314 // |out_num_days| and the function returns True.
315 //
316 // (NOTE: This function does not currently take daylight savings time
317 // into account so the result may up to one hour off. This is because
318 // the glibc date and timezone routines depend on the TZ environment
319 // variable and changing environment variables is not thread-safe.
320 bool ConvertToOmahaInstallDate(base::Time time, int* out_num_days);
321
322 // Look for the minor version value in the passed |store| and set
323 // |minor_version| to that value. Return whether the value was found and valid.
324 bool GetMinorVersion(const brillo::KeyValueStore& store,
325 uint32_t* minor_version);
326
327 // This function reads the specified data in |extents| into |out_data|. The
328 // extents are read from the file at |path|. |out_data_size| is the size of
329 // |out_data|. Returns false if the number of bytes to read given in
330 // |extents| does not equal |out_data_size|.
331 bool ReadExtents(const std::string& path,
332 const std::vector<Extent>& extents,
333 brillo::Blob* out_data,
334 ssize_t out_data_size,
335 size_t block_size);
336
337 bool ReadExtents(FileDescriptorPtr path,
338 const std::vector<Extent>& extents,
339 brillo::Blob* out_data,
340 ssize_t out_data_size,
341 size_t block_size);
342
343 bool WriteExtents(const std::string& path,
344 const google::protobuf::RepeatedPtrField<Extent>& extents,
345 const brillo::Blob& data,
346 size_t block_size);
347
ReadExtents(const std::string & path,const std::vector<Extent> & extents,brillo::Blob * out_data,size_t block_size)348 constexpr bool ReadExtents(const std::string& path,
349 const std::vector<Extent>& extents,
350 brillo::Blob* out_data,
351 size_t block_size) {
352 return ReadExtents(path,
353 extents,
354 out_data,
355 utils::BlocksInExtents(extents) * block_size,
356 block_size);
357 }
358
359 bool ReadExtents(const std::string& path,
360 const google::protobuf::RepeatedPtrField<Extent>& extents,
361 brillo::Blob* out_data,
362 size_t block_size);
363
364 bool ReadExtents(FileDescriptorPtr path,
365 const google::protobuf::RepeatedPtrField<Extent>& extents,
366 brillo::Blob* out_data,
367 size_t block_size);
368
369 // Read the current boot identifier and store it in |boot_id|. This identifier
370 // is constants during the same boot of the kernel and is regenerated after
371 // reboot. Returns whether it succeeded getting the boot_id.
372 bool GetBootId(std::string* boot_id);
373
374 // Gets a string value from the vpd for a given key using the `vpd_get_value`
375 // shell command. Returns true on success.
376 bool GetVpdValue(std::string key, std::string* result);
377
378 // This function gets the file path of the file pointed to by FileDiscriptor.
379 std::string GetFilePath(int fd);
380
381 // Divide |x| by |y| and round up to the nearest integer.
DivRoundUp(uint64_t x,uint64_t y)382 constexpr uint64_t DivRoundUp(uint64_t x, uint64_t y) {
383 return (x + y - 1) / y;
384 }
385
386 // Round |x| up to be a multiple of |y|.
RoundUp(uint64_t x,uint64_t y)387 constexpr uint64_t RoundUp(uint64_t x, uint64_t y) {
388 return DivRoundUp(x, y) * y;
389 }
390
391 // Returns the integer value of the first section of |version|. E.g. for
392 // "10575.39." returns 10575. Returns 0 if |version| is empty, returns -1 if
393 // first section of |version| is invalid (e.g. not a number).
394 int VersionPrefix(const std::string& version);
395
396 // Parses a string in the form high.low, where high and low are 16 bit unsigned
397 // integers. If there is more than 1 dot, or if either of the two parts are
398 // not valid 16 bit unsigned numbers, then 0xffff is returned for both.
399 void ParseRollbackKeyVersion(const std::string& raw_version,
400 uint16_t* high_version,
401 uint16_t* low_version);
402
403 // Return a string representation of |utime| for log file names.
404 std::string GetTimeAsString(time_t utime);
405 // Returns the string format of the hashed |str_to_convert| that can be used
406 // with |Excluder| as the exclusion name.
407 std::string GetExclusionName(const std::string& str_to_convert);
408
409 // Parse `old_version` and `new_version` as integer timestamps and
410 // Return kSuccess if `new_version` is larger/newer.
411 // Return kSuccess if either one is empty.
412 // Return kError if |old_version| is not empty and not an integer.
413 // Return kDownloadManifestParseError if |new_version| is not empty and not an
414 // integer.
415 // Return kPayloadTimestampError if both are integers but |new_version| <
416 // |old_version|.
417 ErrorCode IsTimestampNewer(const std::string_view old_version,
418 const std::string_view new_version);
419
420 std::unique_ptr<android::base::MappedFile> GetReadonlyZeroBlock(size_t size);
421
422 std::string_view GetReadonlyZeroString(size_t size);
423
424 } // namespace utils
425
426 // Utility class to close a file descriptor
427 class ScopedFdCloser {
428 public:
ScopedFdCloser(int * fd)429 explicit ScopedFdCloser(int* fd) : fd_(fd) {}
~ScopedFdCloser()430 ~ScopedFdCloser() {
431 if (should_close_ && fd_ && (*fd_ >= 0) && !IGNORE_EINTR(close(*fd_)))
432 *fd_ = -1;
433 }
set_should_close(bool should_close)434 void set_should_close(bool should_close) { should_close_ = should_close; }
435
436 private:
437 int* fd_;
438 bool should_close_ = true;
439 DISALLOW_COPY_AND_ASSIGN(ScopedFdCloser);
440 };
441
442 // Utility class to delete a file when it goes out of scope.
443 class ScopedPathUnlinker {
444 public:
ScopedPathUnlinker(const std::string & path)445 explicit ScopedPathUnlinker(const std::string& path)
446 : path_(path), should_remove_(true) {}
~ScopedPathUnlinker()447 ~ScopedPathUnlinker() {
448 if (should_remove_ && unlink(path_.c_str()) < 0) {
449 PLOG(ERROR) << "Unable to unlink path " << path_;
450 }
451 }
set_should_remove(bool should_remove)452 void set_should_remove(bool should_remove) { should_remove_ = should_remove; }
453
454 private:
455 const std::string path_;
456 bool should_remove_;
457 DISALLOW_COPY_AND_ASSIGN(ScopedPathUnlinker);
458 };
459
460 class ScopedTempFile {
461 public:
ScopedTempFile()462 ScopedTempFile() : ScopedTempFile("update_engine_temp.XXXXXX") {}
463
464 // If |open_fd| is true, a writable file descriptor will be opened for this
465 // file.
466 // If |truncate_size| is non-zero, truncate file to that size on creation.
467 explicit ScopedTempFile(const std::string& pattern,
468 bool open_fd = false,
469 size_t truncate_size = 0) {
470 CHECK(utils::MakeTempFile(pattern, &path_, open_fd ? &fd_ : nullptr));
471 unlinker_.reset(new ScopedPathUnlinker(path_));
472 if (open_fd) {
473 CHECK_GE(fd_, 0);
474 fd_closer_.reset(new ScopedFdCloser(&fd_));
475 }
476 if (truncate_size > 0) {
477 CHECK_EQ(0, truncate(path_.c_str(), truncate_size));
478 }
479 }
480 virtual ~ScopedTempFile() = default;
481
path()482 const std::string& path() const { return path_; }
fd()483 int fd() const {
484 CHECK(fd_closer_);
485 return fd_;
486 }
CloseFd()487 void CloseFd() {
488 CHECK(fd_closer_);
489 fd_closer_.reset();
490 }
491
492 private:
493 std::string path_;
494 std::unique_ptr<ScopedPathUnlinker> unlinker_;
495
496 int fd_{-1};
497 std::unique_ptr<ScopedFdCloser> fd_closer_;
498
499 DISALLOW_COPY_AND_ASSIGN(ScopedTempFile);
500 };
501
502 // A little object to call ActionComplete on the ActionProcessor when
503 // it's destructed.
504 class ScopedActionCompleter {
505 public:
ScopedActionCompleter(ActionProcessor * processor,AbstractAction * action)506 explicit ScopedActionCompleter(ActionProcessor* processor,
507 AbstractAction* action)
508 : processor_(processor),
509 action_(action),
510 code_(ErrorCode::kError),
511 should_complete_(true) {
512 CHECK(processor_);
513 }
~ScopedActionCompleter()514 ~ScopedActionCompleter() {
515 if (should_complete_)
516 processor_->ActionComplete(action_, code_);
517 }
set_code(ErrorCode code)518 void set_code(ErrorCode code) { code_ = code; }
set_should_complete(bool should_complete)519 void set_should_complete(bool should_complete) {
520 should_complete_ = should_complete;
521 }
get_code()522 ErrorCode get_code() const { return code_; }
523
524 private:
525 ActionProcessor* processor_;
526 AbstractAction* action_;
527 ErrorCode code_;
528 bool should_complete_;
529 DISALLOW_COPY_AND_ASSIGN(ScopedActionCompleter);
530 };
531
532 // Simple wrapper for creating a slice of some container,
533 // similar to string_view but for other containers.
534 template <typename T>
535 struct Range {
RangeRange536 Range(T t1, T t2) : t1_(t1), t2_(t2) {}
beginRange537 constexpr auto begin() const noexcept { return t1_; }
endRange538 constexpr auto end() const noexcept { return t2_; }
539 T t1_;
540 T t2_;
541 };
542
543 std::string HexEncode(const brillo::Blob& blob) noexcept;
544 std::string HexEncode(const std::string_view blob) noexcept;
545
546 template <size_t kSize>
HexEncode(const std::array<uint8_t,kSize> blob)547 std::string HexEncode(const std::array<uint8_t, kSize> blob) noexcept {
548 return base::HexEncode(blob.data(), blob.size());
549 }
550
551 [[nodiscard]] std::string_view ToStringView(
552 const std::vector<unsigned char>& blob) noexcept;
553
ToStringView(const std::vector<char> & blob)554 constexpr std::string_view ToStringView(
555 const std::vector<char>& blob) noexcept {
556 return std::string_view{blob.data(), blob.size()};
557 }
558
559 [[nodiscard]] std::string_view ToStringView(const void* data,
560 size_t size) noexcept;
561
562 } // namespace chromeos_update_engine
563
564 #define TEST_AND_RETURN_FALSE_ERRNO(_x) \
565 do { \
566 bool _success = static_cast<bool>(_x); \
567 if (!_success) { \
568 std::string _msg = android::base::ErrnoNumberAsString(errno); \
569 LOG(ERROR) << #_x " failed: " << _msg; \
570 return false; \
571 } \
572 } while (0)
573
574 #define TEST_AND_RETURN_FALSE(_x) \
575 do { \
576 bool _success = static_cast<bool>(_x); \
577 if (!_success) { \
578 LOG(ERROR) << #_x " failed."; \
579 return false; \
580 } \
581 } while (0)
582
583 #define TEST_AND_RETURN_ERRNO(_x) \
584 do { \
585 bool _success = static_cast<bool>(_x); \
586 if (!_success) { \
587 std::string _msg = android::base::ErrnoNumberAsString(errno); \
588 LOG(ERROR) << #_x " failed: " << _msg; \
589 return; \
590 } \
591 } while (0)
592
593 #define TEST_AND_RETURN(_x) \
594 do { \
595 bool _success = static_cast<bool>(_x); \
596 if (!_success) { \
597 LOG(ERROR) << #_x " failed."; \
598 return; \
599 } \
600 } while (0)
601
602 #define TEST_AND_RETURN_FALSE_ERRCODE(_x) \
603 do { \
604 errcode_t _error = (_x); \
605 if (_error) { \
606 errno = _error; \
607 LOG(ERROR) << #_x " failed: " << _error; \
608 return false; \
609 } \
610 } while (0)
611
612 #define TEST_OP(_x, _y, op) \
613 do { \
614 const auto& x = _x; \
615 const auto& y = _y; \
616 if (!(x op y)) { \
617 LOG(ERROR) << #_x " " #op " " #_y << " failed: " << x << " " #op " " \
618 << y; \
619 return {}; \
620 } \
621 } while (0)
622
623 #define TEST_EQ(_x, _y) TEST_OP(_x, _y, ==)
624 #define TEST_NE(_x, _y) TEST_OP(_x, _y, !=)
625 #define TEST_LE(_x, _y) TEST_OP(_x, _y, <=)
626 #define TEST_GE(_x, _y) TEST_OP(_x, _y, >=)
627 #define TEST_LT(_x, _y) TEST_OP(_x, _y, <)
628 #define TEST_GT(_x, _y) TEST_OP(_x, _y, >)
629
630 // Macro for running a block of code before function exits.
631 // Example:
632 // DEFER {
633 // fclose(hc);
634 // hc = nullptr;
635 // };
636 // It works by creating a new local variable struct holding the lambda, the
637 // destructor of that struct will invoke the lambda.
638
639 constexpr struct {
640 template <typename F>
641 constexpr auto operator<<(F&& f) const noexcept {
642 return android::base::make_scope_guard(std::forward<F>(f));
643 }
644 } deferrer;
645
646 #define TOKENPASTE(x, y) x##y
647 #define DEFER \
648 auto TOKENPASTE(_deferred_lambda_call, __COUNTER__) = deferrer \
649 << [&]() mutable
650
651 #endif // UPDATE_ENGINE_COMMON_UTILS_H_
652